Loading

Analysis of Attack Scenarios in Trust Authentication Protocols
Raghini Mohan1, Miruna Joe Amali Suthanthira Amalraj2, Brindha Subburaj3

1Raghini Mohan, Department of Computer Science & Engineering, K. L. N. College of Engineering, Pottapalayam (Tamil Nadu), India.

2Miruna Joe Amali Suthanthira Amalraj, Department of Computer Science & Engineering, K. L. N. College of Engineering, Pottapalayam (Tamil Nadu), India.

3Brindha Subburaj, Department of Computer Science & Engineering, K. L. N. College of Engineering, Pottapalayam (Tamil Nadu), India.

Manuscript received on 08 December 2019 | Revised Manuscript received on 20 December 2019 | Manuscript Published on 30 December 2019 | PP: 848-858 | Volume-9 Issue-2S2 December 2019 | Retrieval Number: B11321292S219/2019©BEIESP | DOI: 10.35940/ijitee.B1132.1292S219

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The inducing popularity of Wireless Sensor Network (WSN) is more concern with security factors. Secure communication is essential for demanding applications of WSN. Authentication being the crucial service due to deployment of nodes in unattended environment, this paper focus on analysis of popular trust authentication protocols such Trust Aware Routing Framework (TARF), Trust Aware Secure Routing Framework (TSRF), Trust Based Routing Scheme (TRS), Trust Guaranteed Routing (TGR) and Pair Key Based Trust Authentication Protocol (PTAP). Their performance is measured in sample simulation environment. To ensure perfect security in terms of authentication service, analysis of attack scenarios are performed. To implement this, fake attacks are created and the remaining number of legitimate nodes is measured in presence of attacks such as Sybil, black hole, replication and tampering. The analysis results in showing how each protocol withstand with different attack scenarios.

Keywords: Attack, Authentication, Trust, Wireless Sensor Network, Legitimate Nodes.
Scope of the Article: Network Protocols & Wireless Networks