CFP last date
20 December 2024
Reseach Article

Secure Sensor Node Authentication in Wireless Sensor Networks

by Abdullah Al-mahmud, Rumana Akhtar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 4
Year of Publication: 2012
Authors: Abdullah Al-mahmud, Rumana Akhtar
10.5120/6894-9238

Abdullah Al-mahmud, Rumana Akhtar . Secure Sensor Node Authentication in Wireless Sensor Networks. International Journal of Computer Applications. 46, 4 ( May 2012), 10-17. DOI=10.5120/6894-9238

@article{ 10.5120/6894-9238,
author = { Abdullah Al-mahmud, Rumana Akhtar },
title = { Secure Sensor Node Authentication in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 4 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 10-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number4/6894-9238/ },
doi = { 10.5120/6894-9238 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:38:51.662838+05:30
%A Abdullah Al-mahmud
%A Rumana Akhtar
%T Secure Sensor Node Authentication in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 4
%P 10-17
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks are usually installed in a rough environments. Sometimes when the traditional network fails to deploy on that environments. The nodes in the network collect data and information from its environment. These data are moves from one node to another. All the data are not publicly accessible, some of them contain confidential and valuable information which only be accessible through a proper secure mechanism between two communicating parties. A secure authentication scheme can solve this problem to access the confidential data and protect the unauthorized access. In this research paper, we propose a secure sensor node authentication protocol. The protocol uses an identity-based signature (IBS) algorithm where Elliptic Curve Cryptography (ECC) based the digital signature algorithm (DSA) is used to generate a signature on a message and verify a signature on the message within the network. The successful authentication process in this protocol consists a new node registration, node authentication and finally a session key establish between two parties that make their future communication secure. In the WSN, the sensor nodes are installed in a place where the intruder may easily get access on the node. So a compromised node revocation also an important issue which is handled in this protocol. To provide the proper security metric, the protocol also analyzed through some conventional security solutions. The protocol ensures the confidentiality and the integrity of the data, provides improved communicational and computational performance and also achieves the energy efficiency due to the usage of more efficient ECC based DSA algorithm than RSA.

References
  1. M. Halil-Hani, V. P. Nambiar, M. N. Marsono(2010), "Hardware acceleration of OpenSSL cryptography functions for high-performance internet security", International IEEE conference on intelligent systems, modeling and simulation (ISMS), pp 374-379.
  2. H. Jin, H. Debiao and C. Jianhua(2010), "An Identity Based Digital Signature from ECDSA", Second International Workshop on Education Technology and Computer Science (ETCS), pp 627 - 630.
  3. R. Yasmin, E. Ritter, and G. Wang(July 2010), "An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures", 10th International Conference on Computer and Information Technology (CIT).
  4. N. A. Pantazis, D. J. Vergados, D. D. Vergados and C. Douligeris(March 2009), "Energy efficiency in wireless sensor networks using sleep mode TDMA scheduling", Elsevier Science Publishers B. V.
  5. M. C. Gorantla, C. Boyd, and J. M. Gonz_alez Nieto(2008), "ID- based One-pass Authenticated Key Establishment", AISC.
  6. W. Ren, K. Ren, W. Lou and Y. Zhang(2008), "Efficient User Revocation for Privacy-aware PKI", 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness.
  7. M. Durvy, C. Fragouli and P. Thiran (2007),"Towards Reliable Broadcasting using ACKs", Information Theory, 2007. ISIT 2007. IEEE International Symposium, page 1156 - 1160
  8. Hui Song, Liang Xie, Sencun Zhu and Guohong Cao (2007), "Sensor Node Compromise Detection: The Location Perspective" IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing.
  9. C. Jiang, B. Li and H. Xu (2007), "An efficient scheme for user authentication in wireless sensor networks", 21st International Conference on Advanced Information Networking and Applications Workshops, pp 438 - 442.
  10. H. -R. Tseng, R. H. Jan and W. Yang (2007), "An improved dynamic user authentication scheme for wireless sensor networks", Global Telecommunications Conference, pp 986 - 990
  11. Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei (2006), "Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks", Springer Science + Business Media, LLC 2006
  12. D. Liu and P. Ning(2004), "Multilevel mTESLA: Broadcast authentication for distributed sensor networks", ACM Trans. Embed. Comput. Syst. 3(4), pp 800–836.
  13. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz(2004), "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs", CHES, pp 119–132.
Index Terms

Computer Science
Information Sciences

Keywords

Wsn Sensor Node Security Authentication Dsa Ibs Ecc