Authentication Protocol Design and Low-Cost Key Encryption Function Implementation for Wireless Sensor Networks

被引:4
|
作者
Chu, Shao-I [1 ]
Huang, Yu-Jung [2 ]
Lin, Wei-Cheng [2 ]
机构
[1] Natl Kaohsiung Univ Appl Sci, Dept Elect Engn, Kaohsiung 80778, Taiwan
[2] I Shou Univ, Dept Elect Engn, Kaohsiung 84008, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 04期
关键词
Authentication protocol; security; wireless sensor network (WSN); 2-FACTOR USER AUTHENTICATION; SCHEME;
D O I
10.1109/JSYST.2015.2487508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have been widely used, most notably in real-time traffic monitoring and military sensing and tracking. However, WSN applications could suffer from threats and endanger the applications if the suitable security issues are not taken into consideration. As a result, user authentication is an important concern to protect data access from unauthorized users. This paper presents a lightweight mutual authentication protocol for WSN applications. Instead of traditionally using a hash function for data protection, one of the interesting aspects of this protocol is that, for the purpose of data protection but with a low computational cost, the proposed key encryption function only requires simple exclusive-OR (XOR) arithmetic operations. Moreover, the corresponding hardware architecture was implemented by using an Altera DE2 board, including an Altera Cyclone II field-programmable gate array (FPGA). Finally, the output waveforms from the FPGA were displayed on the 16702A logic analysis system for real-time verification.
引用
收藏
页码:2718 / 2725
页数:8
相关论文
共 50 条
  • [1] Design and Implementation of Low-Cost and Low-Energy Sensor for Wireless Sensor Networks
    Babusiak, Branko
    Smondrk, Maros
    [J]. 12TH INTERNATIONAL CONFERENCE ELEKTRO 2018, 2018,
  • [2] BeamStar: A new low-cost data routing protocol for wireless sensor networks
    Mao, SW
    Hou, YT
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2919 - 2924
  • [3] Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks
    Zhou, Jiliang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [4] Low-Cost Multipath Routing Protocol by Adapting Opportunistic Routing in Wireless Sensor Networks
    Kim, Sangdae
    Cho, Hyunchong
    Yang, Taehun
    Kim, Cheonyong
    Kim, Sang-Ha
    [J]. 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [5] Design and Development of Low-cost Wireless Sensor Device for Air Quality Networks
    Sharma, Anamika
    Mishra, Brijesh
    Sutaria, Ronak
    Zele, Rajesh
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 2345 - 2350
  • [6] A low-cost flooding algorithm for wireless sensor networks
    Liang, Ou
    Sekercioglu, Y. Ahmet
    Mani, Nallasamy
    [J]. 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3498 - 3503
  • [7] A Low Overhead and Scalable Authentication and Encryption Scheme for Medical Wireless Sensor Networks
    Vohra, Harpreet
    Hasan, Mohammad Kamrul
    Shukla, Harsh
    Muniyandi, Ravie Chandren
    Alhumyani, Hesham
    Alzaidi, Mohammed S.
    Manna, Manpreet S.
    Islam, Shayla
    Habib, A. K. M. Ahasan
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2023, 13
  • [8] An efficient anonymous user authentication and key agreement protocol for wireless sensor networks
    Kumar, Devender
    Grover, Harmanpreet Singh
    Kaur, Damandeep
    Verma, Adarsh
    Saini, Khushil Kumar
    Kumar, Bijendra
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (05)
  • [9] A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
    Mo, Jiaqing
    Chen, Hang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [10] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Omid Mir
    Jorge Munilla
    Saru Kumari
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 79 - 91