Skip to main content
Log in

Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack

  • Mobile & Wireless Health
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Racherla, G., Wireless sensor networks (WSNs). In: Encyclopedia of Wireless and Mobile Communications, pp 1487–1494, 2008.

  2. Granzer, W., Praus, F., and Kastner, W., Security in building automation systems. IEEE Transactions on industrial Electronics. 57(11):3622–3640, 2010.

    Article  Google Scholar 

  3. Du, X., and Chen, H. H., Security in wireless sensor networks. IEEE Wirel. Commun. :60–66, 2008.

  4. Badache, N., and Khelladi, L., Wireless sensor networks (WSNs): Security. In: Encyclopedia of Wireless and Mobile Communications, pp 1554–1562, 2008.

  5. Zhou, Y, Fang, Y., and Zhang, Y., Securing wireless sensor networks: a survey. IEEE Commun. Surv. :6–28, 2008.

  6. Raymond, D. R., and Midkiff S. F., Denial of service in wireless sensor networks-attacks and defenses. IEEE CS :74–81, 2008.

  7. Pathan, A. S. K., Lee, H. W., and Hong, C. S., Security in wireless sensor networks: Issues and challenges. Icact :1043–1048, 2006.

  8. Martins, D., and Guyennet, H., Wireless sensor network attacks and security mechanisms: A short survey. In: 2010 13th International Conference on Network-Based Information Systems, pp 313–320, 2010

  9. Shu, T., Krunz, M., and Liu, S., Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mob. Comput. :941–954, 2010.

  10. Lasheng, Y., Jie, L., and Renjie, L., An effective data collection algorithm for wireless sensor network. Computing, 2012.

  11. Gnana Kousalya, C., and Anandha Mala, G. S., Secure and energy-efficient traffic-aware key management scheme for wireless sensor network. Int. J. Wireless Inf. Networks :112–121, 2011.

  12. Amara, S. O., Beghdad, R., and Oussalah, M., Securing wireless sensor networks: A survey. EDPACS :6–28, 2013.

  13. Prasad, N. R., and Alam, M., Security framework for wireless sensor networks. Wirel Pers Commun :455–469, 2006.

  14. Yua, B., Xua, C. Z., and Xiao, B., Detecting Sybil attacks in VANETs. J. Parallel Distrib. Comput. :746–756, 2013.

  15. Tian, B., Yao, Y., Shi, L., Shao, S., Liu, Z., and Xu, C., A novel Sybil attack detection scheme for wireless sensor network. In: Proceedings of IEEE IC-BNMT2013, pp 294–297, 2013.

  16. Najafabadi, S. G., Naji, H. R., and Mahani, A., Sybil attack detection: Improving Security of WSNs for Smart Power Grid Application, 2012 Conference on Smart Electric Grids Technology (SEGT2012) December 18-19, 2012, Tehran, Iran, pp 273–278, 2012.

  17. Zhang, Q., Wang, P., Reeves, D. S., and Ning, P., Defending against Sybil attacks in sensor networks. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW’05), 2005.

  18. Galindo, D., Mart’ın, S., Morillo, P., and Villar, J. L., Fujisaki-Okamoto hybrid encryption revisited. Int. J. Inf. Secur. :1–28, 1999.

  19. Raja, K. N., and Beno, M. M., On securing wireless sensor network-novel authentication scheme against DOS attacks. J. Med. Syst. :1–5, 2014.

  20. Ameen, M. A., Liu, J., and Kwak, K., Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. :93–101, 2012.

  21. Baig, M. M., Gholamhosseini, H., and Connolly, M. J., A comprehensive survey of wearable and wireless ECG monitoring systems for older adults. Med. Biol. Eng. Comput.:485–495, 2013

  22. Hsu, W. S., and Pan, J. I., Secure mobile agent for telemedicine based on P2P networks. J. Med. Syst. :1–6, 2013.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Nirmal Raja.

Additional information

This article is part of the Topical Collection on Mobile & Wireless Health

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nirmal Raja, K., Maraline Beno, M. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack. J Med Syst 41, 107 (2017). https://doi.org/10.1007/s10916-017-0743-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-017-0743-2

Keywords

Navigation