-
SCMCI: Secured Click and Mortar Commercial Interaction
Authors:
Mausumi Das Nath,
Tapalina Bhattasali
Abstract:
The wide spread of click-and-mortar model offers an opportunity to consider a universal commercial interaction method. However, issues like privacy protection resist the widespread acceptance. Traditional SET and SSL protocols are designed using Public Key Infrastructure (PKI) where extensive computations are carried out. Our aim is here to design a protocol to secure any type of commercial intera…
▽ More
The wide spread of click-and-mortar model offers an opportunity to consider a universal commercial interaction method. However, issues like privacy protection resist the widespread acceptance. Traditional SET and SSL protocols are designed using Public Key Infrastructure (PKI) where extensive computations are carried out. Our aim is here to design a protocol to secure any type of commercial interaction for online platform, which also considers mobile platform. Therefore, our focus is on reducing heavy computations and making the overall procedure faster. A Secured Click and Mortar Commercial Interaction (SCMCI) protocol is proposed here to improve the performance of the commercial interaction procedure through replacing time consuming public key encryption and decryption algorithms by hybrid logic including the use of symmetric key. Comparative analysis has been done with traditional SET protocol using cryptool to prove the efficiency of the protocol.
△ Less
Submitted 5 December, 2021;
originally announced December 2021.
-
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things
Authors:
Tapalina Bhattasali,
Rituparna Chaki,
Nabendu Chaki
Abstract:
Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current secu…
▽ More
Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current security solutions fail as new threats appear to de-struct the reliability of information. The network has to be transformed to IPv6 enabled network to address huge number of smart objects. Thus new addressing schemes come up with new attacks. Real time analysis of information from the heterogeneous smart objects needs use of cloud services. This can fall prey to cloud specific security threats. Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented.
△ Less
Submitted 19 June, 2014;
originally announced June 2014.
-
SEGNET: Secure Geo-Sensor Network Model
Authors:
Tapalina Bhattasali
Abstract:
Wireless Geo-Sensor Networks (GEONET) are suitable for critical applications in hostile environments due to its flexibility in deployment. But low power geo-sensor nodes are easily compromised by security threats like battery exhaustion attack which may give rise to unavoidable circumstances. In this type of attack, intruder forcefully resists legitimate sensor nodes from going into low-power slee…
▽ More
Wireless Geo-Sensor Networks (GEONET) are suitable for critical applications in hostile environments due to its flexibility in deployment. But low power geo-sensor nodes are easily compromised by security threats like battery exhaustion attack which may give rise to unavoidable circumstances. In this type of attack, intruder forcefully resists legitimate sensor nodes from going into low-power sleep state. So that compromised sensor node's battery power is drained out and it stops working. Due to the limited capability of sensor nodes, it is very difficult to prevent a sensor node from this type of attack which apparently appears as innocent interaction. In this paper, a framework of secure GEONET model (SEGNET) is proposed, based on dynamic load distribution mechanism for heterogeneous environment. It considers hybrid detection approach using three modules for anomaly detection, intrusion confirmation and decision making to reduce the probability of false detection, compared to other existing approaches.
△ Less
Submitted 27 September, 2012;
originally announced September 2012.
-
AMC Model for Denial of Sleep Attack Detection
Authors:
Tapalina Bhattasali,
Rituparna Chaki
Abstract:
Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is…
▽ More
Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sensor network is affected by denial of sleep attack or not can be decided by considering expected death time of sensor network under normal scenario.
△ Less
Submitted 8 March, 2012;
originally announced March 2012.
-
A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network
Authors:
Tapalina Bhattasali,
Rituparna Chaki
Abstract:
Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly devastating attack is the sleep deprivation attack, wh…
▽ More
Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly devastating attack is the sleep deprivation attack, where a malicious node forces legitimate nodes to waste their energy by resisting the sensor nodes from going into low power sleep mode. The goal of this attack is to maximize the power consumption of the target node, thereby decreasing its battery life. Existing works on sleep deprivation attack have mainly focused on mitigation using MAC based protocols, such as S-MAC, T-MAC, B-MAC, etc. In this article, a brief review of some of the recent intrusion detection systems in wireless sensor network environment is presented. Finally, we propose a framework of cluster based layered countermeasure that can efficiently mitigate sleep deprivation attack in WSN. Simulation results on MATLAB exhibit the effectiveness of the proposed model in detecting sleep-deprivation attacks.
△ Less
Submitted 1 March, 2012;
originally announced March 2012.
-
Sleep Deprivation Attack Detection in Wireless Sensor Network
Authors:
Tapalina Bhattasali,
Rituparna Chaki,
Sugata Sanyal
Abstract:
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most danger…
▽ More
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.
△ Less
Submitted 1 March, 2012;
originally announced March 2012.
-
Lightweight Hierarchical Model for HWSNET
Authors:
Tapalina Bhattasali,
Rituparna Chaki
Abstract:
Heterogeneous wireless sensor networks (HWSNET) are more suitable for real life applications as compared to the homogeneous counterpart. Security of HWSNET becomes a very important issue with the rapid development of HWSNET. Intrusion detection system is one of the major and efficient defensive methods against attacks in HWSNET. Because of different constraints of sensor networks, security solutio…
▽ More
Heterogeneous wireless sensor networks (HWSNET) are more suitable for real life applications as compared to the homogeneous counterpart. Security of HWSNET becomes a very important issue with the rapid development of HWSNET. Intrusion detection system is one of the major and efficient defensive methods against attacks in HWSNET. Because of different constraints of sensor networks, security solutions have to be designed with limited usage of computation and resources. A particularly devastating attack is the sleep deprivation attack. Here a malicious node forces legitimate nodes to waste their energy by resisting the sensor nodes from going into low power sleep mode. The target of this attack is to maximize the power consumption of the affected node, thereby decreasing its battery life. Existing works on sleep deprivation attack have mainly focused on mitigation using MAC based protocols, such as S-MAC (sensor MAC), T-MAC (timeout MAC), B-MAC (Berkley MAC), G-MAC (gateway MAC). In this article, a brief review of some of the recent intrusion detection systems in wireless sensor network environment is presented. Finally, a framework of cluster based layered countermeasure for Insomnia Detection has been proposed for heterogeneous wireless sensor network (HWSNET) to efficiently detect sleep deprivation attack. Simulation results on MATLAB exhibit the effectiveness of the proposed model.
△ Less
Submitted 8 November, 2011;
originally announced November 2011.