Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
An efficient and secure directed diffusion in industrial wireless sensor networks
Sengupta J., Ruj S., Das Bit S.  FICN 2018 (Proceedings of the 1st International Workshop on Future Industrial Communication Networks, New Delhi, India, Nov 2, 2018)41-46.2018.Type:Proceedings
Date Reviewed: Mar 11 2019

Directed diffusion is a form of message routing that is application aware, allowing improved energy efficiency through path selection that is empirically efficient, combined with caching and summarization of data as it traverses the network. In a directed diffusion implementation, the data sink sends a data subscription request that floods the network. Data sources then respond to the request if they have the data required. By sending the reply back via the node that the request came on, a routing path can be set up between data source and sink. Although this form of routing is common in wireless sensor networks (WSNs), it is susceptible to both sinkhole and Sybil attacks.

The authors propose using the cryptographic technique of bilinear pairing to secure the network from attack. As each device is equipped with a key that incorporates its location, any compromised node is unable to fake its location, as doing so would invalidate its key. It works on the premise that a new key computed using a node’s own key together with a hash of the counterpart’s location and identity should equal a similar key computed by the counterpart using the former’s location and identity. It should be noted that the proposed enhancements limit the use of the protocol to stationary nodes only.

Reviewing security or encryption algorithms is always a challenge. If one does not find the holes in the algorithm, someone else eventually will. Unfortunately, I found the paper light on technical details, making an evaluation difficult. It is not clear whether there is a risk of a compromised node falsifying its gradient information, nor how using XOR to hash the data content would allow a node to distinguish bad data from a falsified message.

Reviewer:  Bernard Kuc Review #: CR146464 (1905-0170)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
Sensor Networks (C.2.1 ... )
 
 
Wireless Communication (C.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy