Mobile node authentication using key distribution scheme in wireless sensor networks

被引:3
|
作者
Shaila, K. [1 ]
Manjula, S. H. [1 ]
Venugopal, K. R.
Patnaik, L. M. [2 ]
机构
[1] Univ Visvesvaraya, Coll Engn, Dept Comp Sci & Engn, Bangalore 560001, Karnataka, India
[2] Indian Inst Sci, Bangalore 560012, Karnataka, India
关键词
DEV algorithm; EX-OR operation; mobile node; validation time; WSNs; wireless sensor networks;
D O I
10.1504/IJAHUC.2013.051376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.
引用
收藏
页码:34 / 45
页数:12
相关论文
共 50 条
  • [31] An Authentication and Key Establishment Scheme for the IP-Based Wireless Sensor Networks
    Khan, Sarmad Ullah
    Pastrone, Claudio
    Lavagno, Luciano
    Spirito, Maurizio A.
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 1039 - 1045
  • [32] Cryptanalysis on symmetric key techniques based authentication scheme for wireless sensor networks
    Choi, Younsung
    Lee, Youngsook
    Won, Dongho
    Lecture Notes in Electrical Engineering, 2015, 373 : 7 - 13
  • [33] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [34] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chin-Chen Chang
    Wei-Yuan Hsueh
    Ting-Fang Cheng
    Wireless Personal Communications, 2016, 89 : 447 - 465
  • [35] An Effective Dynamic Membership Authentication and Key Management Scheme in Wireless Sensor Networks
    Shi, Hao
    Fan, Mingyu
    Zhang, Yu
    Chen, Maoyang
    Liao, Xingyu
    Hu, Wenqiang
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [36] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chang, Chin-Chen
    Hsueh, Wei-Yuan
    Cheng, Ting-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 447 - 465
  • [37] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [38] A Location-Aware Authentication and Key Management Scheme for Wireless Sensor Networks
    Abdallah, Walid
    Boudriga, Noureddine
    2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2016, : 488 - 495
  • [39] HSKAS: A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks
    Sun, Zeyu
    Ji, Xiaohui
    Li, Yuanbo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 105 - 116
  • [40] An efficient mobile authentication scheme for wireless networks
    Tang, Caimu
    Wu, Dapeng Oliver
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (04) : 1408 - 1416