CFP last date
20 January 2025
Reseach Article

An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC

by Rakesh Maharana, Pabitra Mohan Khilar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 22
Year of Publication: 2013
Authors: Rakesh Maharana, Pabitra Mohan Khilar
10.5120/11528-7352

Rakesh Maharana, Pabitra Mohan Khilar . An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC. International Journal of Computer Applications. 67, 22 ( April 2013), 23-30. DOI=10.5120/11528-7352

@article{ 10.5120/11528-7352,
author = { Rakesh Maharana, Pabitra Mohan Khilar },
title = { An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 22 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number22/11528-7352/ },
doi = { 10.5120/11528-7352 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:09.302001+05:30
%A Rakesh Maharana
%A Pabitra Mohan Khilar
%T An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 22
%P 23-30
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

User authentication in case of wireless sensor network is a very critical task, as sensor nodes are deployed in unattached environment and are prone to possible hostile network attacks. Any authentication protocol in WSN must be designed keeping the fact that sensor nodes have limited computing power, memory, energy and communication capabilities. In this paper,animproved user authentication protocol based on Elliptic Curve Cryptography (ECC) has been introduced for hierarchical wireless sensor networks (HWSN). This paper shows that the ECC based protocol is suitable for wireless sensor networks where higher security is demanded. Besides thisthe proposed scheme provides mutual authentication and a secret session key for communication between the user and the cluster head. It also providesan option for addition or replacement of cluster head in the network whenever there is a need.

References
  1. Akyildiz, I. F. , Su, W. , Sankarasubramaniam, Y. , Cayirci, E. "Wireless sensor networks: a survey". Computer Networks 2002, 38(4):393–422.
  2. Kalra, S. and Sood, S. K. "Elliptic curve cryptography: survey and its security applications". In Proceedings of the International Conference on Advances in Computing and Artificial Intelligence (ACAI '11). ACM, New York, NY, USA, 102-106. 2011
  3. Wang, H. , Sheng, B. , Tan, C. C. and Li. , Q. "Public-key based access control in sensornet". Wirel. Netw. 17, 5 (July 2011).
  4. Wander, A. S. , Gura, N. , Eberle, H. , Gupta, V. and Shantz, S. C. "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks". In Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PERCOM '05). IEEE Computer Society, Washington, DC, USA, 324-328. DOI=10. 1109/PERCOM. 2005. 18.
  5. Rivest, R. L. , Shamir, A. and Adleman, L. M. "A method for obtaining digital signatures and public-key cryptosystems". Communications of the ACM 1978; 21:120–6.
  6. Diffie, W. , Hellman, M. E. "New directions in cryptography". IEEE Transactions on Information Theory 1976; 22:644–54.
  7. Watro, R. , Kong, D. , Cuti, S. , Gardiner, C. , Lynn, C. , Kruus, P. "TinyPK: securing sensor networks with public key technology". In: Proceedings of the 2nd ACM work-shop on security of ad hoc and sensor networks, SASN 2004, Washington, DC, USA; October 2004. p. 59–64
  8. Benenson, Z. , Gartner, F. and Kesdogan, D. "User Authentication in Sensor Networks" (Extended Abstract), Lecture Notes in Informatics Proceedings of Informatics 2004, Workshop on Sensor Networks, Ulm, Germany, September 2004.
  9. Benenson, Z. , Gedicke, N. and Raivio, O. "Realizing Robust User Authentication in Sensor Networks", in the Workshop on Real-World Wireless Sensor Networks, Sweden, June 2005
  10. Wong, K. , Zheng, Y. , Cao, J. , Wang, S. "A dynamic user authentication scheme for wireless sensor networks". In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, IEEE Computer Society; 2006. p. 244–51.
  11. Banerjee, S. and Mukhopadhyay, D. "Symmetric Key Based Authentication Querying in Wireless Sensor Networks", in Proceedings of the First International Conference on Integrated Internet Ad Hoc and Sensor Networks, Nice, France, May 30-31, 2006.
  12. Blundo, C. , Santis, A. D. , Herzberg, A. , Kutten, S. , Vaccaro, U. and Yung, M. "Perfectly-secure key distribution for dynamic conferences", in Advances in Cryptology CRYPTO 92, LNCS 740, pp. 471486, 1993.
  13. Jiang, C. , Li B. and Xu H. "An Efficient Scheme for User Authentication in Wireless Sensor Networks" 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) 2007.
  14. Tseng, H. R. , Jan, R. H. and Yang, W. "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks", GLOBECOM 2007
  15. Das, M. L. "Two-factor user authentication in wireless sensor networks". IEEE Transactions on Wireless Communications 2009; 8(3):1086–90.
  16. Khan, M. K. , Alghathbar, K. "Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks". Sensors 2010; 10:2450–9.
  17. He, D. , Gao, Y. , Chan, S. , Chen, C. and Bu, J. "An enhanced two-factor user authentication scheme in wireless sensor networks". Ad Hoc & Sensor Wireless Networks 2010;10(4).
  18. Omar Cheikhrouhou, AnisKoubâa, ManelBoujelben and Mohamed Abid , "A Lightweight User Authentication Scheme for Wireless Sensor Networks", The ACS/IEEE Workshop : Future Trends on Ad-hoc and Sensor Networks (FTASN2010), Hammamet, Tunisia, May 16-19, 2010.
  19. Tseng H. R. , Jan R. H. and Yang W. "A robust user authentication scheme with self-certificates for wireless sensor networks" SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2010) Published online in Wiley InterScience (www. interscience. wiley. com). DOI: 10. 1002/sec. 212
  20. Kumar, P. , Sain, M. and Lee H. J. "An Efficient Two-Factor User Authentication Framework for Wireless Senor Networks" ICACT 2011
  21. FAN, R. , HE D. J. and PAN, X. Z. Ling-di PING "An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks" Journal of Zhejiang University-SCIENCE C (Computers & Electronics) ISSN 1869-1951 (Print); ISSN 1869-196X (Online) Received Oct. 27, 2010; Revision accepted Feb. 23, 2011; Crosschecked May 30, 2011
  22. Li, F. , Xin, X. and Hu, Y. "Identity-based broadcast signcryption". Computer Standard and Interfaces 2008;30:89–9
  23. Cheng, Y. and Agrawal, D. P. "An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. " Ad Hoc Networks 2007;5(1):35–48
Index Terms

Computer Science
Information Sciences

Keywords

User Authentication Security Public Key Cryptography (PKC) ECC Smart Card Hierarchical Wireless Sensor Network (HWSN)