Mobile node authentication using key distribution scheme in wireless sensor networks

被引:3
|
作者
Shaila, K. [1 ]
Manjula, S. H. [1 ]
Venugopal, K. R.
Patnaik, L. M. [2 ]
机构
[1] Univ Visvesvaraya, Coll Engn, Dept Comp Sci & Engn, Bangalore 560001, Karnataka, India
[2] Indian Inst Sci, Bangalore 560012, Karnataka, India
关键词
DEV algorithm; EX-OR operation; mobile node; validation time; WSNs; wireless sensor networks;
D O I
10.1504/IJAHUC.2013.051376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.
引用
收藏
页码:34 / 45
页数:12
相关论文
共 50 条
  • [1] Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks
    Thevar, Gnana Kousalya Chella
    Rohini, G.
    [J]. WIRELESS NETWORKS, 2017, 23 (05) : 1479 - 1489
  • [2] Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks
    Gnana Kousalya Chella Thevar
    G. Rohini
    [J]. Wireless Networks, 2017, 23 : 1479 - 1489
  • [3] Key PIT-distribution Scheme with Node Revocation for Wireless Sensor Networks
    Yan, Junzhi
    Ma, Jianfeng
    Li, Fenghua
    Moon, SangJae
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (2-3) : 235 - 251
  • [4] Hybrid Authentication and Key Distribution Scheme for Wireless Mobile Multi-Hop Networks
    Lee, Yong
    Lee, Goo-Yeon
    Kim, Hwa-Jong
    Jeong, Choong-Kyo
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (02) : 616 - 619
  • [5] A key distribution scheme for wireless sensor networks
    Kim, Yong Ho
    Lee, Hwaseong
    Lee, Dong Hoon
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 572 - 577
  • [6] A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks
    Qin, Danyang
    Jia, Shuang
    Yang, Songxiang
    Wang, Erfu
    Ding, Qun
    [J]. JOURNAL OF SENSORS, 2016, 2016
  • [7] A Secure Authentication and Key Management Scheme for Wireless Sensor Networks
    Khan, Sarmadullah
    Khan, Rafiullah
    [J]. SENSOR SYSTEMS AND SOFTWARE, 2015, 143 : 51 - 60
  • [8] A Key Distribution Scheme for Wireless Sensor Networks using Normal Curves
    Yu, Wangke
    Ma, Wenping
    Wang, Shuhua
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 77 - 80
  • [9] A Simple Authentication and Key Distribution Protocol in Wireless Mobile Networks
    Wang, Jian
    Jiang, Nan
    Li, Hui
    Niu, Xinxin
    Yang, Yixian
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2282 - +
  • [10] Key renewal scheme with sensor authentication under clustered wireless sensor networks
    Lee, Saewoom
    Kim, Kiseon
    [J]. ELECTRONICS LETTERS, 2015, 51 (04) : 368 - 369