CFP last date
20 January 2025
Reseach Article

Re-authentication in Wireless Sensor Network

by T. Pon Selvalingam, Siva Mahalakshmi, S. Kurshid Jinna
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 55 - Number 8
Year of Publication: 2012
Authors: T. Pon Selvalingam, Siva Mahalakshmi, S. Kurshid Jinna
10.5120/8777-2720

T. Pon Selvalingam, Siva Mahalakshmi, S. Kurshid Jinna . Re-authentication in Wireless Sensor Network. International Journal of Computer Applications. 55, 8 ( October 2012), 32-41. DOI=10.5120/8777-2720

@article{ 10.5120/8777-2720,
author = { T. Pon Selvalingam, Siva Mahalakshmi, S. Kurshid Jinna },
title = { Re-authentication in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 55 },
number = { 8 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 32-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume55/number8/8777-2720/ },
doi = { 10.5120/8777-2720 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:56:45.161655+05:30
%A T. Pon Selvalingam
%A Siva Mahalakshmi
%A S. Kurshid Jinna
%T Re-authentication in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 55
%N 8
%P 32-41
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In an unprotected environment of Wireless Sensor Network, the authentication scheme for multicast secure communication has to be designed with limited usage of resources and computation. In Multicast Authentication Based on Batch Signature-Enhanced (MABS-E) scheme, a tree construction to counteract the Denial of Service (DoS) attack requires latency at the sender. This authentication latency leads to the jitter effect on real-time applications at the receiver. In few applications, user mobility is considered for authentication process. And also, due to user mobility, the sensor node is compromised. This paper proposes a technique called Batch based Selective Bin Verification (BSBV), which avoids the construction of merkle tree. It reduces latency and allows the receiver to tolerate DoS attack even in the case where the attack fails to be detected. In order to prevent to compromise a node, re-authentication scheme is employed, can prolong the lifetime of the sensor network is provided. The number of inspections of each packet is decreased when binning technique is used. In BSBV technique, the packet failure rate is decreased to 0. 01 from 0. 04 because all are verified with the batch verification, when the chosen bin is two. The Packet Delivery Ratio is 82. 95% when fifteen malicious nodes are presented.

References
  1. Chia Mu Yu,"Constrained Function-Based Message Authentication for Sensor Networks," IEEE Transactions on Forensics and Information Security, Vol. 6, No. 2, pp. 407-425, Jun 2011.
  2. Jangseong Kim,"An Efficient and Scalable Re-authentication Protocol over Wireless Sensor Network," IEEE Transactions on Consumer Electronics, Vol. 57, No. 2, pp. 516-522, May 2011.
  3. Amar Rasheed,"Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 1, pp. 176-184, Jan 2011.
  4. Chin Chen Chang,"An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks," IEEE Transactions on Wireless Communications, Vol. 9, No. 11, pp. 3346-3353, Nov 2010.
  5. Taek young Kwon,"Secure and Efficient Broadcast Authentication in Wireless Sensor Networks," IEEE Transactions on Computers, Vol. 59, No. 8, pp. 1120-1133, Aug 2010.
  6. Yun Zhou,"MABS: Multicast Authentication based on Batch Signature," IEEE Transactions on Mobile Computing, Vol. 9, No. 7, pp. 982-993, Jul 2010.
  7. Dexin Yang and Bo Yang,"A Novel Two-Server Password Authentication Scheme with Provable Security," IEEE International Conference on Computer and Information Technology (CIT), Bradford, UK, Jul 1, pp. 1605-1609, 2010.
  8. Kui Ren,"Multi-User Broadcast Authentication in Wireless Sensor Networks," IEEE Transactions on Vehicular Technology, Vol. 58, No. 8, pp. 4554-4564, Oct 2009.
  9. Xuefei Cao,"Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks," IEEE Transactions on Vehicular Technology, Vol. 58, No. 7, pp. 3508-3517, Sep 2009.
  10. Yining Liu,"An Improved Anonymous Remote Authentication Protocol," Second International Symposium on Information Science and Engineering (ISISE), Shanghai, China, Dec 28, pp. 181-184, 2009.
  11. Guangming Dai, "An Effective Signature Scheme based on Tate Pairing for Mobile Business," International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM'08), Dalian, China, Oct 14, Vol. 8, No. 7, pp. 1-4, 2008.
  12. Kui Ren,"On Broadcast Authentication in Wireless Sensor Networks," IEEE Transactions on Wireless Communications, Vol. 6, No. 11, pp. 4136-4144, Nov 2007.
  13. Yun Zhou,"Multimedia Broadcast Authentication Based on Batch Signature," IEEE Communications Magazine, pp. 72-77, Vol. 45, No. 8, Aug 2007.
  14. Hui Song and Liang Xie,"Sensor Node Compromise Detection: The Location Perspective," In proceedings of International Conference on Wireless Communications and Mobile Computing (IWCMC'07), New York, USA, 12-16 Aug, pp. 242-247, 2007.
  15. Haimin Jin and S. Wang,"An Efficient Password-Only Two-Server Authenticated Key Exchange System," In proceedings of the 9th International Conference on Information and Communications Security (ICICS'07), Zhengzhou, Henan Province, China, Lecture Notes in Computer Science 4861, 12-15 Dec, pp. 44-56, 2007.
  16. S. Hussain, F. Kausar, and A. Massod,"An Efficient Key Distribution Scheme for Heterogeneous Sensor Networks," In Proceedings of International Conference on Wireless Communications and Mobile Computing (IWCMC'07), NewYork, USA, 12-15 Aug, pp. 388-392, 2007.
  17. Y. Zhou and Y. Fang,"BABRA: Batch-Based Broadcast Authentication in Wireless Sensor Networks," In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM'06), San Francisco, California, USA, 27 Nov-1 Dec, pp. 1-5, 2006.
  18. Y. Jiang, C. Lin, X. Shen, and M. Shi,"Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks," IEEE Transactions on Wireless Communications, Vol. 5, No. 9, pp. 2569–2576, Sep 2006.
  19. Yanjiang Yang,"A Practical Password-Based Two Server Authentication and key Exchange System," IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 2, pp. 105-114, Apr-Jun 2006.
  20. Qing Li,"Reducing delay and enhancing DoS resistance in Multicast Authentication through Multigrade Security," IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, pp. 190-204, Jun 2006.
  21. Jianmin Zhang and Xiande Liu,"An Efficient Scheme for Broadcast Authentication in Wireless Sensor Networks," 1st International Conference on Communications and Networking, Beijing, China, 25-27 Oct, pp. 1-3, 2006.
  22. S. Choi,"Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-Way Key Chain," In Proceedings of 7th IEEE International Symposium on Multimedia, CA,USA, 12-14 Dec, pp. 701-706, 2005.
  23. Wen Huei Chen,"A Bootstrapping Scheme for Inter-Sensor Authentication within Sensor Networks," IEEE Communications Letters, Vol. 9, No. 10, pp. 945-947, Oct 2005.
  24. D. Boneh, E. -J. Goh and K. Nissim, "Evaluating 2-DNF Formulas on Ciphertexts", Theory of Cryptography, Lecture Notes in Computer Science 3378, pp. 325-341, Feb 2005.
  25. D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks,"ACM Transactions on Information and System Security (TISSEC), Vol. 8, No. 1, pp. 41-77, Feb 2005.
  26. Micah Sherr,"Mitigating DoS Attack Through Selective Bin Verification," IEEE International Conference on Network Protocols (ICNP) Workshop on Secure Network Protocols, Boston, Massachusetts, USA, Nov 6, pp. 7-12, 2005.
  27. C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. D. Tygar, "Distillation Codes and Applications to DoS Resistant Multicast Authentication," In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS'04), San Diego, California, 5-6 Feb, 2004.
  28. C. A. Gunter and S. Khanna,"Dos Protection for Reliably Authenticated Broadcast ," In Proceedings of 11th Annual Network and Distributed System Security Symposium (NDSS'04), San Diego, California, 5-6 Feb, 2004.
  29. S. Rafaeh and D. Hutchison,"A Survey of Key Management for Secure Group Communication," ACM Computing Surveys (CSUR), New York, USA, Vol. 35, No. 3, pp. 309-329, Sep 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Multicast Authentication Signature Re-authentication Membership verification