Skip to main content

Mitigating Replay Attack in Wireless Sensor Network Through Assortment of Packets

  • Conference paper
  • First Online:
Proceedings of the First International Conference on Computational Intelligence and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 507))

Abstract

There are many attacks possible on wireless sensor network (WSN) and replay attack is a major one among them and, moreover, very easy to execute. A replay attack is carried out by continuously keeping track of the messages exchanged between entities and replayed later to either bring down the target entity or affect the performance of the target network. Many mechanisms have been designed to mitigate the replay attack in WSN, but most of the mechanisms are either complex or insecure. In this paper, we propose a mechanism to mitigate the replay attack in WSN. In the proposed work at each node, assorted value of a received packet is maintained in a table and the reply attack is detected or mitigated using their assorted value of the already received packets. The proposed mechanism was simulated and its performance evaluated and it was found that the proposed mechanism mitigates the replay attack, secures the network and takes less time for processing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Syverson, Paul.: A taxonomy of replay attacks [cryptographic protocols] Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings. IEEE, 1994.

    Google Scholar 

  2. Pathan, Al-Sakib Khan, Hyung-Woo Lee, and Choong Seon Hong.: Security in wireless sensor networks: issues and challenges. Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference. Vol. 2. IEEE, 2006.

    Google Scholar 

  3. Karlof, Chris, and David Wagner.: Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks 1.2 (2003): 293–315.

    Google Scholar 

  4. Jesudoss, A., and N. Subramaniam.: A survey on authentication attacks and countermeasures in distributed environment. IJCSE, vol 5.2 (2014).

    Google Scholar 

  5. Raymond, David R., and Scott F. Midkiff.: Denial-of-service in wireless sensor networks: Attacks and defenses. Pervasive Computing, IEEE 7.1 (2008): 74–81.

    Google Scholar 

  6. Raymond, David R., et al.: Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. Vehicular Technology, IEEE Transactions on 58.1 (2009): 367–380.

    Google Scholar 

  7. Di Mauro, Alessio, et al.: Detecting and preventing beacon replay attacks in receiver-initiated MAC protocols for energy efficient WSNs. Secure IT Systems. Springer Berlin Heidelberg, 2013. 1–16.

    Google Scholar 

  8. Baayer, Aziz, Nourddine Enneya, and Mohammed Elkoutbi.: Enhanced timestamp discrepancy to limit impact of replay attacks in manets. (2012).

    Google Scholar 

  9. Sung-Ming, Yen, and Liao Kuo-Hong.: Shared authentication token secure against replay and weak key attacks. Information Processing Letters 62.2 (1997): 77–80.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vandana Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Sharma, V., Hussain, M. (2017). Mitigating Replay Attack in Wireless Sensor Network Through Assortment of Packets. In: Satapathy, S., Prasad, V., Rani, B., Udgata, S., Raju, K. (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore. https://doi.org/10.1007/978-981-10-2471-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2471-9_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2470-2

  • Online ISBN: 978-981-10-2471-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics