Authentication of Mobile Wireless Sensor Networks

被引:0
|
作者
Abd-Eldayem, Sanaa. S. [1 ]
Rizk, M. R. M. [2 ]
Mokhtar, M. A. [2 ]
机构
[1] Pharos Univ Alex, Elect Dept, Alexandria, Egypt
[2] Univ Alexandria, Elect Dept, Alexandria, Egypt
关键词
Wireless Sensor Network; Authentication; Key; Mobile node;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Network (WSN) contains a lot of sensors called nodes or motes. These sensors sense the environmental data, according to the application, and then communicate with each other, and finally send these data or readings back to the base station. WSN security is an important issue, since motes are usually left to operate unattended in the environment where they were deployed. Intruder may inject false data into the network, thus strong security mechanisms are needed to be implemented in order to protect the network against malicious intruder or attacks. This paper proposed a key distribution and authentication protocol designed to achieve some security requirements of WSNs. The paper introduces a simple protocol for shared key discovery and authentication of massage and entity. The work assumes mobile nodes and proposed a re-authentication protocol for nodes to re-authenticate themselves in the new location. The efficiency of the proposed protocol has been ensured in terms of energy consumption, packet size and the security requirements achieved.
引用
收藏
页码:71 / 76
页数:6
相关论文
共 50 条
  • [21] Lightweight Authentication scheme for wireless sensor networks
    Huang, Chih-Hung
    Wu, Hsuan-Hsun
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Pan, Chung-Long
    Chu, Shao-, I
    Chen, Po-Ying
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [22] User Authentication for Hierarchical Wireless Sensor Networks
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 203 - 208
  • [23] Broadcast authentication algorithm for wireless sensor networks
    Yao, Xuan-Xia
    Zheng, Xue-Feng
    Zhou, Xian-Wei
    Tongxin Xuebao/Journal on Communications, 2010, 31 (11): : 49 - 55
  • [24] Multimodal biometric authentication in wireless sensor networks
    Galloway, B. M.
    Niezen, G.
    Hancke, G. P.
    Silva, B. J.
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1003 - 1007
  • [25] Lightweight Authentication for Recovery in Wireless Sensor Networks
    Li, B.
    Batten, L. M.
    Doss, R.
    2009 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS, 2009, : 465 - 471
  • [26] Distributed Node Authentication in Wireless Sensor Networks
    Zhang, Qiyuan
    Zhou, Xuehai
    Yang, Feng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3361 - 3364
  • [27] Survey on Group Authentication in Wireless Sensor Networks
    Chaudhary, Khyati
    Shinde, Gitanjali
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [28] Authentication review for nodes in Wireless Sensor Networks
    Arias, Miguel Alfredo Acedo
    Vilchis, Mar-A Aurora Molina
    Ortigoza, Ramon Silva
    Melchor, Magdalena Marciano
    Flores, Edgar Alfredo Portilla
    TELEMATIQUE, 2009, 8 (01):
  • [29] An authentication scheme for clustered wireless sensor networks
    He, Li-Li
    Lou, Xiao-Chun
    Sensors and Transducers, 2013, 153 (06): : 166 - 170
  • [30] Efficient Broadcast Authentication in Wireless Sensor Networks
    Du, Zhiqiang
    Wang, Kun
    Zhou, Lihua
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 187 - 192