Securing sensor networks by moderating frequencies

Pinaki Sarkar, Priyatosh Mahish, Morshed Uddin Chowdhury, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.

Original languageEnglish
Title of host publicationInternational Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers
EditorsMudhakar Srivatsa, Jing Tian, Jiwu Jing
PublisherSpringer Verlag
Pages173-185
Number of pages13
ISBN (Print)9783319238012
DOIs
Publication statusPublished - Jan 1 2015
Externally publishedYes
Event10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014 - Beijing, China
Duration: Sep 24 2014Sep 26 2014

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume153
ISSN (Print)1867-8211

Other

Other10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014
CountryChina
CityBeijing
Period9/24/149/26/14

Fingerprint

Sensor networks
Network protocols
Magnetooptical effects
Sensors
Security of data
Wireless sensor networks
Experiments

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

Sarkar, P., Mahish, P., Chowdhury, M. U., & Sakurai, K. (2015). Securing sensor networks by moderating frequencies. In M. Srivatsa, J. Tian, & J. Jing (Eds.), International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers (pp. 173-185). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 153). Springer Verlag. https://doi.org/10.1007/978-3-319-23802-9_15

Securing sensor networks by moderating frequencies. / Sarkar, Pinaki; Mahish, Priyatosh; Chowdhury, Morshed Uddin; Sakurai, Kouichi.

International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. ed. / Mudhakar Srivatsa; Jing Tian; Jiwu Jing. Springer Verlag, 2015. p. 173-185 (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 153).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sarkar, P, Mahish, P, Chowdhury, MU & Sakurai, K 2015, Securing sensor networks by moderating frequencies. in M Srivatsa, J Tian & J Jing (eds), International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 153, Springer Verlag, pp. 173-185, 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, Beijing, China, 9/24/14. https://doi.org/10.1007/978-3-319-23802-9_15
Sarkar P, Mahish P, Chowdhury MU, Sakurai K. Securing sensor networks by moderating frequencies. In Srivatsa M, Tian J, Jing J, editors, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Springer Verlag. 2015. p. 173-185. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST). https://doi.org/10.1007/978-3-319-23802-9_15
Sarkar, Pinaki ; Mahish, Priyatosh ; Chowdhury, Morshed Uddin ; Sakurai, Kouichi. / Securing sensor networks by moderating frequencies. International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. editor / Mudhakar Srivatsa ; Jing Tian ; Jiwu Jing. Springer Verlag, 2015. pp. 173-185 (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST).
@inproceedings{ef2a4ef914e342ce80ad2510ef4b4427,
title = "Securing sensor networks by moderating frequencies",
abstract = "Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.",
author = "Pinaki Sarkar and Priyatosh Mahish and Chowdhury, {Morshed Uddin} and Kouichi Sakurai",
year = "2015",
month = "1",
day = "1",
doi = "10.1007/978-3-319-23802-9_15",
language = "English",
isbn = "9783319238012",
series = "Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST",
publisher = "Springer Verlag",
pages = "173--185",
editor = "Mudhakar Srivatsa and Jing Tian and Jiwu Jing",
booktitle = "International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers",
address = "Germany",

}

TY - GEN

T1 - Securing sensor networks by moderating frequencies

AU - Sarkar, Pinaki

AU - Mahish, Priyatosh

AU - Chowdhury, Morshed Uddin

AU - Sakurai, Kouichi

PY - 2015/1/1

Y1 - 2015/1/1

N2 - Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.

AB - Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.

UR - http://www.scopus.com/inward/record.url?scp=84952313973&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84952313973&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-23802-9_15

DO - 10.1007/978-3-319-23802-9_15

M3 - Conference contribution

AN - SCOPUS:84952313973

SN - 9783319238012

T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

SP - 173

EP - 185

BT - International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers

A2 - Srivatsa, Mudhakar

A2 - Tian, Jing

A2 - Jing, Jiwu

PB - Springer Verlag

ER -