TY - GEN
T1 - Securing sensor networks by moderating frequencies
AU - Sarkar, Pinaki
AU - Mahish, Priyatosh
AU - Chowdhury, Morshed Uddin
AU - Sakurai, Kouichi
PY - 2015
Y1 - 2015
N2 - Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.
AB - Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.
UR - http://www.scopus.com/inward/record.url?scp=84952313973&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84952313973&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-23802-9_15
DO - 10.1007/978-3-319-23802-9_15
M3 - Conference contribution
AN - SCOPUS:84952313973
SN - 9783319238012
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 173
EP - 185
BT - International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers
A2 - Srivatsa, Mudhakar
A2 - Tian, Jing
A2 - Jing, Jiwu
PB - Springer Verlag
T2 - 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014
Y2 - 24 September 2014 through 26 September 2014
ER -