CFP last date
20 January 2025
Reseach Article

Trusted Lightweight Authentication Protocol used in Wireless Sensor Network

Published on June 2015 by Pranjali P. Koli, D.g. Khairnar, Trupti Wagh
National Conference on Emerging Trends in Advanced Communication Technologies
Foundation of Computer Science USA
NCETACT2015 - Number 4
June 2015
Authors: Pranjali P. Koli, D.g. Khairnar, Trupti Wagh
f5d46308-c09e-4964-8cba-d2cc5cc4e7d1

Pranjali P. Koli, D.g. Khairnar, Trupti Wagh . Trusted Lightweight Authentication Protocol used in Wireless Sensor Network. National Conference on Emerging Trends in Advanced Communication Technologies. NCETACT2015, 4 (June 2015), 1-4.

@article{
author = { Pranjali P. Koli, D.g. Khairnar, Trupti Wagh },
title = { Trusted Lightweight Authentication Protocol used in Wireless Sensor Network },
journal = { National Conference on Emerging Trends in Advanced Communication Technologies },
issue_date = { June 2015 },
volume = { NCETACT2015 },
number = { 4 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/ncetact2015/number4/21000-2044/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Advanced Communication Technologies
%A Pranjali P. Koli
%A D.g. Khairnar
%A Trupti Wagh
%T Trusted Lightweight Authentication Protocol used in Wireless Sensor Network
%J National Conference on Emerging Trends in Advanced Communication Technologies
%@ 0975-8887
%V NCETACT2015
%N 4
%P 1-4
%D 2015
%I International Journal of Computer Applications
Abstract

Secure data transmission is essential in Wireless Sensor Network (WSN) to protect sensitive communications in the network. To improve the security of such network, this project proposes a successful routing among authentic nodes with adversary nodes inside the network, and forms the secure wireless sensor network. The authentication protocol will enable the receiving end to affirm that the packet has originated from a genuine node. It will preserve the integrity as well as authentication and confidentiality. Impersonation attack can be prevented in which a node will pretend like other node and sends the request to base station. Trust values to nodes make it more secure system. Performance of the proposed system evaluated based on the parameters such as delay and transmission overhead. General Terms

References
  1. D. Boneh, B. Lynn, H. Shacham, Short signatures from the weil pairing, in: Proc. ASIACRYPT, LNCS, Springer, 2001, pp. 514–532.
  2. S. Zhao, A. Akshai, R. Frost, X. Bai, A survey of applications of identity-based cryptography in mobile ad-hoc networks, IEEE Communication. Tutorials Early Access (2011) 1–21.
  3. D. Liu and P. Ning, "Multi-level ?TESLA: Broadcast authentication for distributed sensor networks," ACM Transactions in Embedded Computing Systems (TECS), vol. 3, no. 4, 2004
  4. M. J. Bohio, A. Miri, An authenticated broadcasting scheme for wireless ad hoc network, in: Proc. CNSR 2004, IEEE Computer Society, 2004, pp. 69–74.
  5. Y. Zhang, W. Liu, W. Lou, Y. Fang, MASK: anonymous on-demand routing in mobile ad hoc networks, in: Wireless Commun. , IEEE, 2006, pp. 2376–2385.
  6. S. Goldwasser, S. Micali, R. L. Rivest, A digital signature scheme secure against adaptive chosen-message attacks, J. SIAM Comput. 17 (April) (1988) 281–308.
  7. N. P, An Identity-based Authenticated key agreement protocol Based on the Weil Pairing, in: Dept of Computer Science University of Bristol Merchant Venturers Building Woodland Road_Bristol BS_UB, pp. 1–6.
  8. Mark Hempstead, Michael J. Lyons, David Hardware Systems for Wireless Sensor Networks, "Journal of Low Power Electronics Vol. 4, 1–10, 2008
  9. Jianmin Zhang , Wenqi Yu and Xiande Liu, "CRTBA: Chinese Remainder Theorem- Based Broadcast Authentication in Wireless Sensor Networks," in Computer Network and Multimedia Technology, 2009, Wuhan, International Symposium on 18-20 Jan. 2009.
  10. Mark Hempstead, Michael J. Lyons, David Hardware Systems for Wireless Sensor Networks, "Journal of Low Power Electronics Vol. 4, 1–10, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Wsn Authentication Trust Impersonation Attack Chinese Remainder Theorem Encryption