Mobile node authentication using key distribution scheme in wireless sensor networks

被引:3
|
作者
Shaila, K. [1 ]
Manjula, S. H. [1 ]
Venugopal, K. R.
Patnaik, L. M. [2 ]
机构
[1] Univ Visvesvaraya, Coll Engn, Dept Comp Sci & Engn, Bangalore 560001, Karnataka, India
[2] Indian Inst Sci, Bangalore 560012, Karnataka, India
关键词
DEV algorithm; EX-OR operation; mobile node; validation time; WSNs; wireless sensor networks;
D O I
10.1504/IJAHUC.2013.051376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.
引用
收藏
页码:34 / 45
页数:12
相关论文
共 50 条
  • [21] Public key based key distribution scheme for wireless sensor networks
    Huang, Jie
    Huang, Bei
    Tongxin Xuebao/Journal on Communications, 2011, 32 (10): : 52 - 58
  • [22] A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks
    Louw, J.
    Niezen, G.
    Ramotsoela, T. D.
    Abu-Mahfouz, A. M.
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1166 - 1170
  • [23] A New Scheme of Key Distribution using Implicit Security in Wireless Sensor Networks
    Chiang, Chien-Wen
    Lin, Chih-Chung
    Chang, Ray-I
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 151 - 155
  • [24] Untraceability of Sensor Node Authentication in Wireless Sensor Networks
    Pathak, Ganesh R.
    Edake, Gaurish M.
    Patil, Suhas H.
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 893 - 897
  • [25] Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks
    Kubra Kalkan
    Albert Levi
    Peer-to-Peer Networking and Applications, 2014, 7 : 698 - 709
  • [26] Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks
    Kalkan, Kubra
    Levi, Albert
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 698 - 709
  • [27] A key pre-distribution scheme for wireless sensor networks
    Price, A
    Kosaka, K
    Chatterjee, S
    2005 Wireless Telecommunications Symposium, 2005, : 253 - 260
  • [28] Distributed Node Authentication in Wireless Sensor Networks
    Zhang, Qiyuan
    Zhou, Xuehai
    Yang, Feng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3361 - 3364
  • [29] An Authenticated Group Key Distribution Scheme for Wireless Sensor Networks
    李林春
    李建华
    李生红
    潘军
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (03) : 354 - 358
  • [30] Authenticated group key distribution scheme for wireless sensor networks
    Li L.-C.
    Li J.-H.
    Li S.-H.
    Pan J.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (03) : 354 - 358