Mobile node authentication using key distribution scheme in wireless sensor networks

被引:3
|
作者
Shaila, K. [1 ]
Manjula, S. H. [1 ]
Venugopal, K. R.
Patnaik, L. M. [2 ]
机构
[1] Univ Visvesvaraya, Coll Engn, Dept Comp Sci & Engn, Bangalore 560001, Karnataka, India
[2] Indian Inst Sci, Bangalore 560012, Karnataka, India
关键词
DEV algorithm; EX-OR operation; mobile node; validation time; WSNs; wireless sensor networks;
D O I
10.1504/IJAHUC.2013.051376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.
引用
收藏
页码:34 / 45
页数:12
相关论文
共 50 条
  • [41] Data Authentication Scheme for Unattended Wireless Sensor Networks against a Mobile Adversary
    Reddy, Sasi Kiran V. L.
    Ruj, Sushmita
    Nayak, Amiya
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1836 - 1841
  • [42] A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks
    Wang, Qiuhua
    SENSORS, 2017, 17 (02)
  • [43] Adaptive Combinatorial Key Scheme for Mobile Heterogeneous Wireless Sensor Networks
    Aly, Wael Hosny Fouad
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 371 - 376
  • [44] Lightweight Authentication scheme for wireless sensor networks
    Huang, Chih-Hung
    Wu, Hsuan-Hsun
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Pan, Chung-Long
    Chu, Shao-, I
    Chen, Po-Ying
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [45] An authentication scheme for clustered wireless sensor networks
    He, Li-Li
    Lou, Xiao-Chun
    Sensors and Transducers, 2013, 153 (06): : 166 - 170
  • [46] A Hierarchical Authentication Scheme in Wireless Sensor Networks
    Wu, Bing
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 630 - 635
  • [47] DHB-KEY: An Efficient Key Distribution Scheme for Wireless Sensor Networks
    Chung, Tony
    Roedig, Utz
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 840 - 846
  • [48] A key distribution scheme based on public key cryptography for wireless sensor networks
    Li, Xiaolong
    Lin, Yaping
    Yi, Yeqing
    Yu, Jianping
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1113 - 1116
  • [49] A Fine-grained Localization Scheme Using A Mobile Beacon Node for Wireless Sensor Networks
    Liu, Kezhong
    Xiong, Ji
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2010, 6 (02): : 147 - 162
  • [50] Key pre-distribution scheme for wireless sensor networks using deployed knowledge
    Yu, Wangke
    Ma, Wenping
    Wang, Shuhua
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (11): : 51 - 54