An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks

被引:24
|
作者
Mezrag, Fares [1 ]
Bitam, Salim [2 ]
Mellouk, Abdelhamid [3 ]
机构
[1] Univ MSila, Dept Comp Sci, Msila, Algeria
[2] Univ Biskra, Dept Comp Sci, Biskra, Algeria
[3] Univ Paris Est Creteil, LISSI TincNET, F-94400 Vitry Sur Seine, France
关键词
Cluster-based WSN; Identity-based cryptography; Elliptic curve; Mutual authentication; Key agreement; AVISPA; AUTHENTICATED KEY AGREEMENT; PROTOCOLS; INTERNET; MANAGEMENT;
D O I
10.1016/j.jnca.2021.103282
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Clustered Wireless Sensor Networks (CWSNs) are typically deployed in unsecured or even hostile areas, making them vulnerable to many cyber-attacks and security threats that adversely affect their performance. Furthermore, the design of an efficient cryptographic scheme for CWSN is challenging due to the dynamic nature of the network and resource-constrained sensor devices. The paper presents a new identity-based authentication and key agreement scheme for CWSNs called IBAKAS, which combines Elliptic Curve Cryptography (ECC) and Identity-Based Cryptography (IBC) to provide mutual authentication and establish secret session keys over insecure channels. IBAKAS achieves all desirable security properties of key agreement and prevents specific cyber-attacks on CWSN. Moreover, the formal security of the proposed scheme is verified using the AVISPA tool. Comparison with existing relevant schemes shows that the proposed scheme decreases computational and communication overheads, saves keys storage space and prolongs the network lifetime by reducing the energy consumption of the sensor node.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Secure Monitoring Scheme Based on Identity-based Threshold Signcryption for Wireless Sensor Networks
    Li Jing-feng
    Wei Da-wei
    Kou Hong-zhao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3718 - 3721
  • [2] εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    Shim, Kyung-Ah
    Lee, Young-Ran
    Park, Cheol-Min
    AD HOC NETWORKS, 2013, 11 (01) : 182 - 189
  • [3] An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks
    Khashan, Osama A.
    Ahmad, Rami
    Khafajah, Nour M.
    AD HOC NETWORKS, 2021, 115
  • [4] A Novel Identity-based Security Scheme for Wireless Sensor Networks
    Qin, Zhongyuan
    Feng, Kerong
    Hu, Shuaiqi
    Tao, Lei
    Hu, Zunli
    Zhang, Xinshuai
    Huang, Jie
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 662 - 666
  • [5] An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
    Qin, Zhongyuan
    Zhang, Xinshuai
    Feng, Kerong
    Zhang, Qunfang
    Huang, Jie
    SENSORS, 2014, 14 (10) : 17937 - 17951
  • [6] A Lightweight Secure Provenance Scheme for Wireless Sensor Networks
    Sultana, Salmin
    Ghinita, Gabriel
    Bertino, Elisa
    Shehab, Mohamed
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 101 - 108
  • [7] A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems
    Yaduvanshi, Ritika
    Mishra, Shivendu
    Yadav, Nimisha
    Rajpoot, Prince
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (5-6) : 415 - 436
  • [8] An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
    Kim, Intae
    Hwang, SeongOun
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (03) : 891 - 895
  • [9] An Efficient and Secure Scheme for Smart Home Communication using Identity-Based Signcryption
    Ashibani, Yosef
    Mahmoud, Qusay H.
    2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017,
  • [10] A novel encryption scheme for wireless sensor networks based on identity-based encryption
    Yang, Geng
    Yu, Xiao-Jie
    Wang, Jiang-Tao
    Cheng, Hong-Bing
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (04): : 1 - 7