Mobile node authentication using key distribution scheme in wireless sensor networks

被引:3
|
作者
Shaila, K. [1 ]
Manjula, S. H. [1 ]
Venugopal, K. R.
Patnaik, L. M. [2 ]
机构
[1] Univ Visvesvaraya, Coll Engn, Dept Comp Sci & Engn, Bangalore 560001, Karnataka, India
[2] Indian Inst Sci, Bangalore 560012, Karnataka, India
关键词
DEV algorithm; EX-OR operation; mobile node; validation time; WSNs; wireless sensor networks;
D O I
10.1504/IJAHUC.2013.051376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.
引用
收藏
页码:34 / 45
页数:12
相关论文
共 50 条
  • [31] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chin-Chen Chang
    Wei-Yuan Hsueh
    Ting-Fang Cheng
    [J]. Wireless Personal Communications, 2016, 89 : 447 - 465
  • [32] An Effective Dynamic Membership Authentication and Key Management Scheme in Wireless Sensor Networks
    Shi, Hao
    Fan, Mingyu
    Zhang, Yu
    Chen, Maoyang
    Liao, Xingyu
    Hu, Wenqiang
    [J]. 2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [33] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [34] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chang, Chin-Chen
    Hsueh, Wei-Yuan
    Cheng, Ting-Fang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 447 - 465
  • [35] A Location-Aware Authentication and Key Management Scheme for Wireless Sensor Networks
    Abdallah, Walid
    Boudriga, Noureddine
    [J]. 2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2016, : 488 - 495
  • [36] HSKAS: A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks
    Sun, Zeyu
    Ji, Xiaohui
    Li, Yuanbo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 105 - 116
  • [37] An efficient mobile authentication scheme for wireless networks
    Tang, Caimu
    Wu, Dapeng Oliver
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (04) : 1408 - 1416
  • [38] Data Authentication Scheme for Unattended Wireless Sensor Networks against a Mobile Adversary
    Reddy, Sasi Kiran V. L.
    Ruj, Sushmita
    Nayak, Amiya
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1836 - 1841
  • [40] Adaptive Combinatorial Key Scheme for Mobile Heterogeneous Wireless Sensor Networks
    Aly, Wael Hosny Fouad
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 371 - 376