CFP last date
20 January 2025
Reseach Article

Identity-based Authentication and Access Control in Wireless Sensor Networks

by Abdullah Al-mahmud, Matei Ciobanu Morogan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 13
Year of Publication: 2012
Authors: Abdullah Al-mahmud, Matei Ciobanu Morogan
10.5120/5602-7858

Abdullah Al-mahmud, Matei Ciobanu Morogan . Identity-based Authentication and Access Control in Wireless Sensor Networks. International Journal of Computer Applications. 41, 13 ( March 2012), 18-24. DOI=10.5120/5602-7858

@article{ 10.5120/5602-7858,
author = { Abdullah Al-mahmud, Matei Ciobanu Morogan },
title = { Identity-based Authentication and Access Control in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 13 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 18-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number13/5602-7858/ },
doi = { 10.5120/5602-7858 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:29:31.453573+05:30
%A Abdullah Al-mahmud
%A Matei Ciobanu Morogan
%T Identity-based Authentication and Access Control in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 13
%P 18-24
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The application and usage of the wireless sensor network is rapidly growing. Wireless sensor networks are normally deployed into the unattended environment where the intended user can get access of the network. The sensor nodes collect data from this environment. If the data are valuable and confidential then some security measures are needed to protect the data from the unauthorized access. In this paper, I propose an identity-based user authentication and access control protocol based on the Identity-Based Signature (IBS) scheme where the ECC (Elliptic Curve Cryptography) based digital signature algorithm (DSA) is used for signing a message and verifying a message for a wireless sensor networks. This protocol accomplishes the registration of a new user, authentication of a user, session key establishment between sensor node and the user; and finally grants the appropriate data access to the user. User revocation is also handled in this proposed protocol. Compared with other conventional security solutions, this protocol provides confidentiality and integrity of the sensor data; and also achieves better computational, communicational performance and energy efficiency due to the use of more efficient IBS algorithms based on ECC than those based on RSA.

References
  1. Rehana Yasmin, Eike Ritter, and Guilin Wang (July 2010), An Authentication Framework forWireless Sensor Networks using Identity-Based Signatures, 10th International Conference on Computer and Information Technology (CIT).
  2. X. Cao, W. Kou, L. Dang, and B. Zhao (2008), IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks, Computer Communications 31(4), pp 659 – 667.
  3. D. Liu and P. Ning (2004), Multilevel mTESLA: Broadcast authentication for distributed sensor networks, ACM Trans. Embed. Comput. Syst. 3(4), pp 800–836.
  4. Hu Jin, He Debiao and Chen Jianhua (2010), An Identity Based Digital Signature from ECDSA, Second International Workshop on Education Technology and Computer Science (ETCS), pp 627 - 630.
  5. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz (2004), Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, CHES, pp 119–132.
  6. M. Choudary Gorantla, Colin Boyd, and Juan Manuel Gonz_alez Nieto (2008), ID- based One-pass Authenticated Key Establishment, AISC.
  7. Wei Ren, Kui Ren, Wenjing Lou and Yanchao Zhang (2008), Efficient User Revocation for Privacy-aware PKI, 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness.
  8. Wei Dai (September 2010), Crypto++ Library 5. 6. 1, Ibiblio-The Public's Library and Digital Archive
  9. Erik Eliasson (May 2006), Secure Internet Telephony: Design, Implementation, and Performance Measurements, TRITA-ICT/ECS AVH 06:04
  10. A. Molana, A. Vina, and R. Juanes (1994), An open Posix. 4 based architecture for real time intelligent control, Second international IEEE conference on intelligent systems engineering, pp 378-388.
  11. M. Halil-Hani, V. P. Nambiar, M. N. Marsono (2010), Hardware acceleration of OpenSSL cryptography functions for high-performance internet security, International IEEE conference on intelligent systems, modelling and simulation (ISMS), pp 374-379.
  12. Z. Benenson, F. Gartner and D. Kesdogan (2004), User authentication in sensor networks
  13. S. BaneIjee and D. Mukhopadhyay (2006), Symmetric key based authentication querying in wireless sensor networks, First international conference on Integrated internet ad hoc and sensor networks.
  14. C. Jiang, B. Li and H. Xu (2007), An efficient scheme for user authentication in wireless sensor networks, 21st International Conference on Advanced Information Networking and Applications Workshops, pp 438 - 442.
  15. H. -R. Tseng, R. H. Jan and W. Yang (2007), An improved dynamic user authentication scheme for wireless sensor networks, Global Telecommunications Conference, pp 986 - 990
  16. Nikolaos A. Pantazis, Dimitrios J. Vergados, Dimitrios D. Vergados and Christos Douligeris (March 2009), Energy efficiency in wireless sensor networks using sleep mode TDMA scheduling, Elsevier Science Publishers B. V.
Index Terms

Computer Science
Information Sciences

Keywords

Wsn Security Authentication Access Control Ibs