A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

被引:10
|
作者
Qin, Danyang [1 ]
Jia, Shuang [1 ]
Yang, Songxiang [1 ]
Wang, Erfu [1 ]
Ding, Qun [1 ]
机构
[1] Heilongjiang Univ, Key Lab Elect & Commun Engn, Harbin, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2016/1547963
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS) is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] A Combined Key Management Scheme in Wireless Sensor Networks
    Zhang, Qikun
    Tan, Yuan
    Zhang, Li
    Wang, Ruifang
    [J]. SENSOR LETTERS, 2011, 9 (04) : 1501 - 1506
  • [42] Centralized Key Management Scheme in Wireless Sensor Networks
    Banihashemian, Saber
    Bafghi, Abbas Ghaemi
    Moghaddam, Mohammad Hossien Yaghmaee
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 60 (03) : 463 - 474
  • [43] The Key Management Scheme of Wireless Sensor Networks Based on Key Database
    Wan Ting
    Zhuo Li
    Wei Yan
    Zhang Qing
    Liu Gang
    [J]. ISTM/2011: 9TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, 2011, : 710 - 713
  • [44] An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks
    Xiong, Ling
    Xiong, Naixue
    Wang, Changyuan
    Yu, Xinqiao
    Shuai, Mengxia
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (09): : 5626 - 5638
  • [45] An Authentication and Key Establishment Scheme for the IP-Based Wireless Sensor Networks
    Khan, Sarmad Ullah
    Pastrone, Claudio
    Lavagno, Luciano
    Spirito, Maurizio A.
    [J]. ANT 2012 AND MOBIWIS 2012, 2012, 10 : 1039 - 1045
  • [46] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [47] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chin-Chen Chang
    Wei-Yuan Hsueh
    Ting-Fang Cheng
    [J]. Wireless Personal Communications, 2016, 89 : 447 - 465
  • [48] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [49] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chang, Chin-Chen
    Hsueh, Wei-Yuan
    Cheng, Ting-Fang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 447 - 465
  • [50] Mobile node authentication using key distribution scheme in wireless sensor networks
    Shaila, K.
    Manjula, S. H.
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 12 (01) : 34 - 45