Abstract
There are many attacks possible on wireless sensor network (WSN) and replay attack is a major one among them and, moreover, very easy to execute. A replay attack is carried out by continuously keeping track of the messages exchanged between entities and replayed later to either bring down the target entity or affect the performance of the target network. Many mechanisms have been designed to mitigate the replay attack in WSN, but most of the mechanisms are either complex or insecure. In this paper, we propose a mechanism to mitigate the replay attack in WSN. In the proposed work at each node, assorted value of a received packet is maintained in a table and the reply attack is detected or mitigated using their assorted value of the already received packets. The proposed mechanism was simulated and its performance evaluated and it was found that the proposed mechanism mitigates the replay attack, secures the network and takes less time for processing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Syverson, Paul.: A taxonomy of replay attacks [cryptographic protocols] Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings. IEEE, 1994.
Pathan, Al-Sakib Khan, Hyung-Woo Lee, and Choong Seon Hong.: Security in wireless sensor networks: issues and challenges. Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference. Vol. 2. IEEE, 2006.
Karlof, Chris, and David Wagner.: Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks 1.2 (2003): 293–315.
Jesudoss, A., and N. Subramaniam.: A survey on authentication attacks and countermeasures in distributed environment. IJCSE, vol 5.2 (2014).
Raymond, David R., and Scott F. Midkiff.: Denial-of-service in wireless sensor networks: Attacks and defenses. Pervasive Computing, IEEE 7.1 (2008): 74–81.
Raymond, David R., et al.: Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. Vehicular Technology, IEEE Transactions on 58.1 (2009): 367–380.
Di Mauro, Alessio, et al.: Detecting and preventing beacon replay attacks in receiver-initiated MAC protocols for energy efficient WSNs. Secure IT Systems. Springer Berlin Heidelberg, 2013. 1–16.
Baayer, Aziz, Nourddine Enneya, and Mohammed Elkoutbi.: Enhanced timestamp discrepancy to limit impact of replay attacks in manets. (2012).
Sung-Ming, Yen, and Liao Kuo-Hong.: Shared authentication token secure against replay and weak key attacks. Information Processing Letters 62.2 (1997): 77–80.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Sharma, V., Hussain, M. (2017). Mitigating Replay Attack in Wireless Sensor Network Through Assortment of Packets. In: Satapathy, S., Prasad, V., Rani, B., Udgata, S., Raju, K. (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore. https://doi.org/10.1007/978-981-10-2471-9_22
Download citation
DOI: https://doi.org/10.1007/978-981-10-2471-9_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2470-2
Online ISBN: 978-981-10-2471-9
eBook Packages: EngineeringEngineering (R0)