SlideShare a Scribd company logo
1 of 3
Download to read offline
30 International Journal for Modern Trends in Science and Technology
An Encrypted MAC for the Authentication Process
in WSN
Pavan A C
PG Student, Department of CS&E, P.E.S. College of Engineering, Mandya, Karnataka, India.
To Cite this Article
Pavan A C , “An Encrypted MAC for the Authentication Process in WSN”, International Journal for Modern Trends in
Science and Technology, Vol. 02, Issue 12, 2016, pp. 30-32.
Security infringement and energy consumption issues are vital in WSN (wireless sensor networks). Looking
at the attacks like Denial-of-Sleep, Man-in-the-Middle, Correlation attack, etc, are affecting the transfer of any
data. It might be the data loss or the modification where in the third party access the information to one self.
This paper explains how to authenticate the data transfer using the encryption standards in MAC algorithm
in a riskless technique.
KEYWORDS: WSN, Denial-of sleep, MAC, Encryption Standards, Transport Layer Security, Cryptography.
Copyright © 2016 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
Wireless sensor networks are in continual need
where the physical environment requirements are
to be converted to readable data. Be it the area of
monitoring, heath care or earth sensing like air
pollution, WSN [2]-[5] sensors are in major use in
all such applications. When considering duty-cycle
based WSN MAC protocols, the sensor nodes are
either in one of the two states namely awake/active
and sleep state. These states are switched
periodically and they enter sleep mode after certain
idle period hence, reducing energy
consumption.WSN often encounters various
security attacks, one such attacks is DOS
(denial-of-service). In a DOS attack the legitimate
user node is sent certain unwanted data to process
sent by the attackers. This leads to not providing
the actual service required to the user who
requested the service.
Denial of sleep is a special type of DOS attack. In
denial of sleep attack the sensor nodes are kept
awake to consume more energy. An anti-node can
send fake data packets to other nodes of WSNs. If
the receiver is unable to judge among the real and
the fake node, the receiver will receive and process
the data from the anti-node. This keeps the receiver
awake as long as the data transmission sustains,
thus exhausting the battery of nodes rapid
manner. This might lead the legitimate user node
to provide all the services to fake node repeatedly.
Hence the security is an issue and more power
consumed unnecessarily.
The data to be transmitted is sent with a MAC
signature which is generated by MAC algorithm.
This data while matching the signature the energy
may drain off or if the algorithm is hacked then the
message may be modified before reaching to the
destination. In order to overcome these problems a
fast authentication scheme is required that if
integrated with Encrypted MAC protocol it could
counter the Denial-of-Sleep attack.
The design principles and features of the
proposed secure scheme are:
 Energy conservation
 Low complexity
 Mutual authentication
ABSTRACT
International Journal for Modern Trends in Science and Technology
Volume: 02, Issue No: 12, December 2016
ISSN: 2455-3778
http://www.ijmtst.com
31 International Journal for Modern Trends in Science and Technology
Pavan A C : An Encrypted MAC for the Authentication Process in WSN
 Capability to counter the Denial-of-Sleep
attack
 Integrating the Encrypted MAC protocol
The paper structure is as follows. Firstly, a
literature survey upon the existing system is being
specified in “EXISTING SCHEME“ section which
also mentions the various types of encryption in
brief. Secondly, the proposed system in the
“ENHANCED SCHEME“, briefs about how
encrypted MAC is being integrated and the
un-authorization is reduced.
II. EXISTING SCHEME
A message authentication code [1] (MAC) is a
short signature that is used to authenticate a
message. A MAC algorithm, accepts as input a
secret key and an arbitrary-length of message from
the actual message that has to be sent and outputs
a MAC. The MAC value protects both a message's
data integrity as well as its authenticity, by
allowing verifiers (who also possess the secret key)
to detect any changes to the message content. In
MAC protocol, all the nodes will be having the MAC
algorithm. Here, the sender node will have a key (k)
and uses the message to run in the MAC algorithm
to get the MAC tag. The message and the MAC
signature are then sent to the receiver node. The
receiver node in turn runs the message portion of
the transmission through the same MAC algorithm
using the same key, producing another MAC
signature. The receiver then compares the MAC
signature. If they are matched, the message was
not altered during transmission and it is not an
anti-node. If the MAC function is not matched then
the message will be discarded.
Fig-1 :- Message Authentication Code (MAC)
MAC protocol [6]-[7] uses the hashing function so
that the authentication process takes places at a
faster rate, so that the system wake-up time will be
less and the energy will not be drained soon.
Therefore the normal nodes are kept as it is and the
anti-nodes are labeled malicious and are neglected
for further transmission.
MAC protocol is safe and authenticated process
where in no data is lost or modified at the time of
transfer of message. But even at some point of time
if the pre-installed MAC algorithm is hacked then
the message that is transfer can be accessed or
modified and this will effect in draining of energy in
the node. Therefore, to reduce the energy
consumption, to counter the power exhausting
attacks, and enhance the performance of sensor
nodes, a transport layer security design of secure
scheme which integrates the MAC protocol along
with encryption can be used.
III. ENHANCED SCHEME
In order to overcome the drawbacks of the above
discussed scheme, the enhanced scheme that is
the MAC-then-Encrypt (MtE) process is being used
in which Transport Layer Security (TLS) is being
utilized.
A MAC [8]-[9] is produced based on the plaintext,
and then the plaintext and MAC are together
encrypted to produce a ciphertext based on both.
The ciphertext (containing an encrypted MAC) is
sent. Even though the MtE approach has not been
proven to be strongly unforgettable in it, the
SSL/TLS [10]-[11] implementation has been
proven to be strongly unforgeable by Krawczyk who
showed that SSL/TLS was in fact secure because of
the encoding used alongside the MtE
mechanism.Transport Layer Security (TLS) and its
predecessor, Secure Sockets Layer (SSL), are
cryptographic protocols that provide
communications security over a cluster of nodes.
The Transport Layer Security protocol aims
primarily to provide privacy and data integrity
between two communicating nodes.
Fig-2:- MAC with Encryption
32 International Journal for Modern Trends in Science and Technology
Pavan A C : An Encrypted MAC for the Authentication Process in WSN
When secured by TLS, connections between two
nodes have one or more of the following properties:
 The connection is secure because symmetric
cryptography is used to encrypt the data
transmitted. The keys for this symmetric
encryption are generated uniquely for each
connection and are based on a shared secret
negotiated at the start of the session. The
nodes negotiate the details of which
encryption algorithm and cryptographic keys
to use before the first byte of data is
transmitted. The negotiation of a shared
secret is both secure (the secret is
unavailable and cannot be obtained, even by
an attacker who places themselves in the
middle of the connection) and reliable (no
attacker can modify the communications
during the transfer without being detected).
 The identity of the communicating nodes can
be authenticated using public-key
cryptography. This authentication can be
made optional, but is generally required for at
least one of the nodes.
IV. CONCLUSION
In this paper, an enhancement of Encrypted
MAC protocol has been proposed to secure
authentication, confidentiality and save the energy
in the nodes in a wireless sensor network. The
involvement of MAC signature with every message
encrypted while transfer gives more authenticity
and also reduces wakeup time of the node. Hence
the proposed Encryption MAC protocol helps to
uphold the secure authentication and energy
efficiency of the wireless sensor networks.
REFERENCES
[1] Pavan A C and P. Prasanna, “Secure & Energy
Efficient Scheme against Denial-of-Sleep Attack in
WSN”, IJMTST | Volume: 2 | Issue: 05 | May 2016.
[2] Zheng, Jun, and Abbas Jamalipour. Wireless sensor
networks: a networking perspective. Wiley. com,
2009.
[3] Kaur, Simerpreet, MdAtaullah, and Monika Garg.
"Security from Denial of Sleep Attack in Wireless
Sensor Network." INTERNATIONAL JOURNAL OF
COMPUTERS & TECHNOLOGY 4.2 (2013): 419-425.
[4] P. Ganesan, R. Venugopalan, P. Peddabachagari, A.
Dean, F. Mueller, and M. Sichitiu, “Analyzing and
modeling encryption overhead for sensor network
nodes,” in Proc. ACM 2nd ACM Int. Conf. Wireless
Sensor Netw. Appl. (WSNA), San Diego, CA, USA,
2003, pp. 151–159.
[5] W. Liu, R. Luo, and H. Yang, “Cryptography
overhead evaluation and analysis for wireless sensor
networks,” in Proc. WRI Int. Conf. Commun. Mobile
Comput. (CMC), Kunming, China, Jan. 2009, pp.
496–501.
[6] A. Bachir, M. Dohler, T. Watteyne, and K. K. Leung,
“MAC essentials for wireless sensor networks,” IEEE
Commun. Surv. Tuts., vol. 12, no. 2, pp. 222–248,
Second Quarter 2010.
[7] J. Kabara and M. Calle, “MAC protocols used by
wirelesssensor networks and a general method of
performance evaluation,” Int. J. Distrib. Sensor
Netw., vol. 2012, pp. 1–11, 2012, Art. ID 834784.
[8] P. Huang, L. Xiao, S. Soltani, M.W. Mutka, and N. Xi,
“The evolution of MAC protocols in wireless sensor
networks: A survey,” IEEE commun. Surv. Tuts., vol.
15, no. 1, pp. 101–120, First Quarter 2013.
[9] W. Ye, J. Heidemann, and D. Estrin, “An
energy-efficient MAC protocol for wireless sensor
networks,” in Proc. 21st Annu. Joint Conf. IEEE
Comput. Commun. Soc. (INFOCOM), Los Angeles,
CA, USA, 2002, vol. 3, pp. 1567–1576.
[10]T. Dierks; E. Rescorla (August 2008). "The Transport
Layer Security (TLS) Protocol, Version 1.2" SSL:
Intercepted today, decrypted tomorrow, Netcraft,
2013-06-25.
[11]A. Freier; P. Karlton; P. Kocher (August 2011). "The
Secure Sockets Layer (SSL) Protocol Version 3.0".

More Related Content

What's hot

Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
2013 and 2014 ieee projects list
2013 and 2014 ieee projects list2013 and 2014 ieee projects list
2013 and 2014 ieee projects listManju Nath
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...ijceronline
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
 
2014 and 2015 ieee final list
2014 and 2015 ieee  final list2014 and 2015 ieee  final list
2014 and 2015 ieee final listManju Nath
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detectingjpstudcorner
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Selva Raj
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeyEditor IJMTER
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chIJECEIAES
 

What's hot (16)

Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
2013 and 2014 ieee projects list
2013 and 2014 ieee projects list2013 and 2014 ieee projects list
2013 and 2014 ieee projects list
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETS
 
2014 and 2015 ieee final list
2014 and 2015 ieee  final list2014 and 2015 ieee  final list
2014 and 2015 ieee final list
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detecting
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 ch
 

Viewers also liked

Predictive Analytics in Education Context
Predictive Analytics in Education ContextPredictive Analytics in Education Context
Predictive Analytics in Education ContextIJMTST Journal
 
Steady State Thermal Analysis of Thermo Siphon Heat Pipe Photovoltaic Panel C...
Steady State Thermal Analysis of Thermo Siphon Heat Pipe Photovoltaic Panel C...Steady State Thermal Analysis of Thermo Siphon Heat Pipe Photovoltaic Panel C...
Steady State Thermal Analysis of Thermo Siphon Heat Pipe Photovoltaic Panel C...IJMTST Journal
 
Fuzzy based Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed...
Fuzzy based Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed...Fuzzy based Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed...
Fuzzy based Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed...IJMTST Journal
 
Efficient Method of Power Saving Topologically-Compressed With 21Transistor’s...
Efficient Method of Power Saving Topologically-Compressed With 21Transistor’s...Efficient Method of Power Saving Topologically-Compressed With 21Transistor’s...
Efficient Method of Power Saving Topologically-Compressed With 21Transistor’s...IJMTST Journal
 
Improvement of Power Quality by using Injection Super Capacitor UPQC for BLDC...
Improvement of Power Quality by using Injection Super Capacitor UPQC for BLDC...Improvement of Power Quality by using Injection Super Capacitor UPQC for BLDC...
Improvement of Power Quality by using Injection Super Capacitor UPQC for BLDC...IJMTST Journal
 
Implementation and Estimation of Delay, Power and Area for Parallel Prefix Ad...
Implementation and Estimation of Delay, Power and Area for Parallel Prefix Ad...Implementation and Estimation of Delay, Power and Area for Parallel Prefix Ad...
Implementation and Estimation of Delay, Power and Area for Parallel Prefix Ad...IJMTST Journal
 
A Two Stage Crawler on Web Search using Site Ranker for Adaptive Learning
A Two Stage Crawler on Web Search using Site Ranker for Adaptive LearningA Two Stage Crawler on Web Search using Site Ranker for Adaptive Learning
A Two Stage Crawler on Web Search using Site Ranker for Adaptive LearningIJMTST Journal
 
Simulation Approach to Speed Control of PMBLDC Motor using Various Control Te...
Simulation Approach to Speed Control of PMBLDC Motor using Various Control Te...Simulation Approach to Speed Control of PMBLDC Motor using Various Control Te...
Simulation Approach to Speed Control of PMBLDC Motor using Various Control Te...IJMTST Journal
 
Implementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select AdderImplementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select AdderIJMTST Journal
 
A Method for the Reduction 0f Linear High Order MIMO Systems Using Interlacin...
A Method for the Reduction 0f Linear High Order MIMO Systems Using Interlacin...A Method for the Reduction 0f Linear High Order MIMO Systems Using Interlacin...
A Method for the Reduction 0f Linear High Order MIMO Systems Using Interlacin...IJMTST Journal
 
Computational Estimation of Flow through the C-D Supersonic Nozzle and Impuls...
Computational Estimation of Flow through the C-D Supersonic Nozzle and Impuls...Computational Estimation of Flow through the C-D Supersonic Nozzle and Impuls...
Computational Estimation of Flow through the C-D Supersonic Nozzle and Impuls...IJMTST Journal
 
Photo Voltaic Cell Integrated DVR for Power Quality Improvement
Photo Voltaic Cell Integrated DVR for Power Quality ImprovementPhoto Voltaic Cell Integrated DVR for Power Quality Improvement
Photo Voltaic Cell Integrated DVR for Power Quality ImprovementIJMTST Journal
 

Viewers also liked (15)

Ambasador marki
Ambasador markiAmbasador marki
Ambasador marki
 
Predictive Analytics in Education Context
Predictive Analytics in Education ContextPredictive Analytics in Education Context
Predictive Analytics in Education Context
 
Steady State Thermal Analysis of Thermo Siphon Heat Pipe Photovoltaic Panel C...
Steady State Thermal Analysis of Thermo Siphon Heat Pipe Photovoltaic Panel C...Steady State Thermal Analysis of Thermo Siphon Heat Pipe Photovoltaic Panel C...
Steady State Thermal Analysis of Thermo Siphon Heat Pipe Photovoltaic Panel C...
 
Fuzzy based Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed...
Fuzzy based Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed...Fuzzy based Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed...
Fuzzy based Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed...
 
Efficient Method of Power Saving Topologically-Compressed With 21Transistor’s...
Efficient Method of Power Saving Topologically-Compressed With 21Transistor’s...Efficient Method of Power Saving Topologically-Compressed With 21Transistor’s...
Efficient Method of Power Saving Topologically-Compressed With 21Transistor’s...
 
Improvement of Power Quality by using Injection Super Capacitor UPQC for BLDC...
Improvement of Power Quality by using Injection Super Capacitor UPQC for BLDC...Improvement of Power Quality by using Injection Super Capacitor UPQC for BLDC...
Improvement of Power Quality by using Injection Super Capacitor UPQC for BLDC...
 
Implementation and Estimation of Delay, Power and Area for Parallel Prefix Ad...
Implementation and Estimation of Delay, Power and Area for Parallel Prefix Ad...Implementation and Estimation of Delay, Power and Area for Parallel Prefix Ad...
Implementation and Estimation of Delay, Power and Area for Parallel Prefix Ad...
 
A Two Stage Crawler on Web Search using Site Ranker for Adaptive Learning
A Two Stage Crawler on Web Search using Site Ranker for Adaptive LearningA Two Stage Crawler on Web Search using Site Ranker for Adaptive Learning
A Two Stage Crawler on Web Search using Site Ranker for Adaptive Learning
 
Social media
Social mediaSocial media
Social media
 
Simulation Approach to Speed Control of PMBLDC Motor using Various Control Te...
Simulation Approach to Speed Control of PMBLDC Motor using Various Control Te...Simulation Approach to Speed Control of PMBLDC Motor using Various Control Te...
Simulation Approach to Speed Control of PMBLDC Motor using Various Control Te...
 
Implementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select AdderImplementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select Adder
 
A Method for the Reduction 0f Linear High Order MIMO Systems Using Interlacin...
A Method for the Reduction 0f Linear High Order MIMO Systems Using Interlacin...A Method for the Reduction 0f Linear High Order MIMO Systems Using Interlacin...
A Method for the Reduction 0f Linear High Order MIMO Systems Using Interlacin...
 
Computational Estimation of Flow through the C-D Supersonic Nozzle and Impuls...
Computational Estimation of Flow through the C-D Supersonic Nozzle and Impuls...Computational Estimation of Flow through the C-D Supersonic Nozzle and Impuls...
Computational Estimation of Flow through the C-D Supersonic Nozzle and Impuls...
 
Sradhanjali Bhatta
Sradhanjali BhattaSradhanjali Bhatta
Sradhanjali Bhatta
 
Photo Voltaic Cell Integrated DVR for Power Quality Improvement
Photo Voltaic Cell Integrated DVR for Power Quality ImprovementPhoto Voltaic Cell Integrated DVR for Power Quality Improvement
Photo Voltaic Cell Integrated DVR for Power Quality Improvement
 

Similar to An Encrypted MAC for the Authentication Process in WSN

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043Selva Raj
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...ijctet
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...theijes
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Networkijsrd.com
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKScsandit
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 

Similar to An Encrypted MAC for the Authentication Process in WSN (20)

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

An Encrypted MAC for the Authentication Process in WSN

  • 1. 30 International Journal for Modern Trends in Science and Technology An Encrypted MAC for the Authentication Process in WSN Pavan A C PG Student, Department of CS&E, P.E.S. College of Engineering, Mandya, Karnataka, India. To Cite this Article Pavan A C , “An Encrypted MAC for the Authentication Process in WSN”, International Journal for Modern Trends in Science and Technology, Vol. 02, Issue 12, 2016, pp. 30-32. Security infringement and energy consumption issues are vital in WSN (wireless sensor networks). Looking at the attacks like Denial-of-Sleep, Man-in-the-Middle, Correlation attack, etc, are affecting the transfer of any data. It might be the data loss or the modification where in the third party access the information to one self. This paper explains how to authenticate the data transfer using the encryption standards in MAC algorithm in a riskless technique. KEYWORDS: WSN, Denial-of sleep, MAC, Encryption Standards, Transport Layer Security, Cryptography. Copyright © 2016 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION Wireless sensor networks are in continual need where the physical environment requirements are to be converted to readable data. Be it the area of monitoring, heath care or earth sensing like air pollution, WSN [2]-[5] sensors are in major use in all such applications. When considering duty-cycle based WSN MAC protocols, the sensor nodes are either in one of the two states namely awake/active and sleep state. These states are switched periodically and they enter sleep mode after certain idle period hence, reducing energy consumption.WSN often encounters various security attacks, one such attacks is DOS (denial-of-service). In a DOS attack the legitimate user node is sent certain unwanted data to process sent by the attackers. This leads to not providing the actual service required to the user who requested the service. Denial of sleep is a special type of DOS attack. In denial of sleep attack the sensor nodes are kept awake to consume more energy. An anti-node can send fake data packets to other nodes of WSNs. If the receiver is unable to judge among the real and the fake node, the receiver will receive and process the data from the anti-node. This keeps the receiver awake as long as the data transmission sustains, thus exhausting the battery of nodes rapid manner. This might lead the legitimate user node to provide all the services to fake node repeatedly. Hence the security is an issue and more power consumed unnecessarily. The data to be transmitted is sent with a MAC signature which is generated by MAC algorithm. This data while matching the signature the energy may drain off or if the algorithm is hacked then the message may be modified before reaching to the destination. In order to overcome these problems a fast authentication scheme is required that if integrated with Encrypted MAC protocol it could counter the Denial-of-Sleep attack. The design principles and features of the proposed secure scheme are:  Energy conservation  Low complexity  Mutual authentication ABSTRACT International Journal for Modern Trends in Science and Technology Volume: 02, Issue No: 12, December 2016 ISSN: 2455-3778 http://www.ijmtst.com
  • 2. 31 International Journal for Modern Trends in Science and Technology Pavan A C : An Encrypted MAC for the Authentication Process in WSN  Capability to counter the Denial-of-Sleep attack  Integrating the Encrypted MAC protocol The paper structure is as follows. Firstly, a literature survey upon the existing system is being specified in “EXISTING SCHEME“ section which also mentions the various types of encryption in brief. Secondly, the proposed system in the “ENHANCED SCHEME“, briefs about how encrypted MAC is being integrated and the un-authorization is reduced. II. EXISTING SCHEME A message authentication code [1] (MAC) is a short signature that is used to authenticate a message. A MAC algorithm, accepts as input a secret key and an arbitrary-length of message from the actual message that has to be sent and outputs a MAC. The MAC value protects both a message's data integrity as well as its authenticity, by allowing verifiers (who also possess the secret key) to detect any changes to the message content. In MAC protocol, all the nodes will be having the MAC algorithm. Here, the sender node will have a key (k) and uses the message to run in the MAC algorithm to get the MAC tag. The message and the MAC signature are then sent to the receiver node. The receiver node in turn runs the message portion of the transmission through the same MAC algorithm using the same key, producing another MAC signature. The receiver then compares the MAC signature. If they are matched, the message was not altered during transmission and it is not an anti-node. If the MAC function is not matched then the message will be discarded. Fig-1 :- Message Authentication Code (MAC) MAC protocol [6]-[7] uses the hashing function so that the authentication process takes places at a faster rate, so that the system wake-up time will be less and the energy will not be drained soon. Therefore the normal nodes are kept as it is and the anti-nodes are labeled malicious and are neglected for further transmission. MAC protocol is safe and authenticated process where in no data is lost or modified at the time of transfer of message. But even at some point of time if the pre-installed MAC algorithm is hacked then the message that is transfer can be accessed or modified and this will effect in draining of energy in the node. Therefore, to reduce the energy consumption, to counter the power exhausting attacks, and enhance the performance of sensor nodes, a transport layer security design of secure scheme which integrates the MAC protocol along with encryption can be used. III. ENHANCED SCHEME In order to overcome the drawbacks of the above discussed scheme, the enhanced scheme that is the MAC-then-Encrypt (MtE) process is being used in which Transport Layer Security (TLS) is being utilized. A MAC [8]-[9] is produced based on the plaintext, and then the plaintext and MAC are together encrypted to produce a ciphertext based on both. The ciphertext (containing an encrypted MAC) is sent. Even though the MtE approach has not been proven to be strongly unforgettable in it, the SSL/TLS [10]-[11] implementation has been proven to be strongly unforgeable by Krawczyk who showed that SSL/TLS was in fact secure because of the encoding used alongside the MtE mechanism.Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communications security over a cluster of nodes. The Transport Layer Security protocol aims primarily to provide privacy and data integrity between two communicating nodes. Fig-2:- MAC with Encryption
  • 3. 32 International Journal for Modern Trends in Science and Technology Pavan A C : An Encrypted MAC for the Authentication Process in WSN When secured by TLS, connections between two nodes have one or more of the following properties:  The connection is secure because symmetric cryptography is used to encrypt the data transmitted. The keys for this symmetric encryption are generated uniquely for each connection and are based on a shared secret negotiated at the start of the session. The nodes negotiate the details of which encryption algorithm and cryptographic keys to use before the first byte of data is transmitted. The negotiation of a shared secret is both secure (the secret is unavailable and cannot be obtained, even by an attacker who places themselves in the middle of the connection) and reliable (no attacker can modify the communications during the transfer without being detected).  The identity of the communicating nodes can be authenticated using public-key cryptography. This authentication can be made optional, but is generally required for at least one of the nodes. IV. CONCLUSION In this paper, an enhancement of Encrypted MAC protocol has been proposed to secure authentication, confidentiality and save the energy in the nodes in a wireless sensor network. The involvement of MAC signature with every message encrypted while transfer gives more authenticity and also reduces wakeup time of the node. Hence the proposed Encryption MAC protocol helps to uphold the secure authentication and energy efficiency of the wireless sensor networks. REFERENCES [1] Pavan A C and P. Prasanna, “Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN”, IJMTST | Volume: 2 | Issue: 05 | May 2016. [2] Zheng, Jun, and Abbas Jamalipour. Wireless sensor networks: a networking perspective. Wiley. com, 2009. [3] Kaur, Simerpreet, MdAtaullah, and Monika Garg. "Security from Denial of Sleep Attack in Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4.2 (2013): 419-425. [4] P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, “Analyzing and modeling encryption overhead for sensor network nodes,” in Proc. ACM 2nd ACM Int. Conf. Wireless Sensor Netw. Appl. (WSNA), San Diego, CA, USA, 2003, pp. 151–159. [5] W. Liu, R. Luo, and H. Yang, “Cryptography overhead evaluation and analysis for wireless sensor networks,” in Proc. WRI Int. Conf. Commun. Mobile Comput. (CMC), Kunming, China, Jan. 2009, pp. 496–501. [6] A. Bachir, M. Dohler, T. Watteyne, and K. K. Leung, “MAC essentials for wireless sensor networks,” IEEE Commun. Surv. Tuts., vol. 12, no. 2, pp. 222–248, Second Quarter 2010. [7] J. Kabara and M. Calle, “MAC protocols used by wirelesssensor networks and a general method of performance evaluation,” Int. J. Distrib. Sensor Netw., vol. 2012, pp. 1–11, 2012, Art. ID 834784. [8] P. Huang, L. Xiao, S. Soltani, M.W. Mutka, and N. Xi, “The evolution of MAC protocols in wireless sensor networks: A survey,” IEEE commun. Surv. Tuts., vol. 15, no. 1, pp. 101–120, First Quarter 2013. [9] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proc. 21st Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Los Angeles, CA, USA, 2002, vol. 3, pp. 1567–1576. [10]T. Dierks; E. Rescorla (August 2008). "The Transport Layer Security (TLS) Protocol, Version 1.2" SSL: Intercepted today, decrypted tomorrow, Netcraft, 2013-06-25. [11]A. Freier; P. Karlton; P. Kocher (August 2011). "The Secure Sockets Layer (SSL) Protocol Version 3.0".