z-logo
open-access-imgOpen Access
Employing Keyed Hash Algorithm, Sequential Probability Ratio Test, and Temperature Comparison Test as Security Against Node Capture Attacks of IoT-Based WSNs
Author(s) -
Jhon Aron F. Varca,
Earl Nestor T. Velasquez,
Joseph Bryan G. Ibarra
Publication year - 2021
Publication title -
journal of communications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.185
H-Index - 35
eISSN - 2374-4367
pISSN - 1796-2021
DOI - 10.12720/jcm.16.11.500-507
Subject(s) - computer science , hash function , node (physics) , algorithm , protocol (science) , reliability (semiconductor) , hash chain , computer network , computer security , medicine , power (physics) , physics , alternative medicine , structural engineering , pathology , quantum mechanics , engineering
The emergence of IoT opened new opportunities for development in various fields. With all the information that it gathers, it became an interesting target for multiple attackers. Thus, this study will enforce security solutions to IoT-based devices specifically in the perception layer by incorporating a Temperature Comparison Test, Keyed Hash Algorithm and evaluating it using SPRT especially in the defense against malicious activities detected in the nodes of a network namely for Mobile and Immobile attacks. For immobile attacks, using the keyed hash algorithm and the SPRT, the hash key of the passcodes was compared to determine the safety of the nodes. Hence, from the functionality test that was conducted, and evaluating the data gathered using SPRT and Bernoulli’s equation, the reliability of the protocol to detect Immobile attacks is concluded to have a 100% detection rate. For mobile node attacks, the study assumes the environment to be under normal, warm, and cold room temperatures. where both mobile and without mobile attack is simulated, the result shows that there is only an overall 3% difference from the temperature measure by the sensor to the ambient temperature. Hence, combining these protocols that are applied in the study eliminates the single points of failure in the nodes that are either applicable only to a distributed scheme or mobility support, the study also compared the tested protocol to the other existing protocols.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here