An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks

被引:24
|
作者
Mezrag, Fares [1 ]
Bitam, Salim [2 ]
Mellouk, Abdelhamid [3 ]
机构
[1] Univ MSila, Dept Comp Sci, Msila, Algeria
[2] Univ Biskra, Dept Comp Sci, Biskra, Algeria
[3] Univ Paris Est Creteil, LISSI TincNET, F-94400 Vitry Sur Seine, France
关键词
Cluster-based WSN; Identity-based cryptography; Elliptic curve; Mutual authentication; Key agreement; AVISPA; AUTHENTICATED KEY AGREEMENT; PROTOCOLS; INTERNET; MANAGEMENT;
D O I
10.1016/j.jnca.2021.103282
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Clustered Wireless Sensor Networks (CWSNs) are typically deployed in unsecured or even hostile areas, making them vulnerable to many cyber-attacks and security threats that adversely affect their performance. Furthermore, the design of an efficient cryptographic scheme for CWSN is challenging due to the dynamic nature of the network and resource-constrained sensor devices. The paper presents a new identity-based authentication and key agreement scheme for CWSNs called IBAKAS, which combines Elliptic Curve Cryptography (ECC) and Identity-Based Cryptography (IBC) to provide mutual authentication and establish secret session keys over insecure channels. IBAKAS achieves all desirable security properties of key agreement and prevents specific cyber-attacks on CWSN. Moreover, the formal security of the proposed scheme is verified using the AVISPA tool. Comparison with existing relevant schemes shows that the proposed scheme decreases computational and communication overheads, saves keys storage space and prolongs the network lifetime by reducing the energy consumption of the sensor node.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Identity-based key management scheme with provable security for wireless sensor networks
    Zhou, Nanrun
    Jiang, Qiongxi
    Chen, Xun
    Journal of Information and Computational Science, 2011, 8 (14): : 3075 - 3081
  • [22] An authenticated identity-based key establishment and encryption scheme for wireless sensor networks
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (31-38):
  • [23] A lightweight security scheme for query processing in clustered wireless sensor networks
    Ghosal, Amrita
    DasBit, Sipra
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 41 : 240 - 255
  • [24] LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
    Dini, Gianluca
    Savino, Ida M.
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2011, 10 (04)
  • [25] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [26] Advanced Lightweight, Dependable and Secure Trust System for Clustered Wireless Sensor Networks
    Shakkira, K.
    Mubarak, Mohamed T.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [27] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [28] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [29] Energy Efficient Secure Communication in Wireless Sensor Networks
    Gudivada, Ravi Babu
    Hansdah, R. C.
    PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 311 - 319
  • [30] Identity-based secure collaboration in wireless ad hoc networks
    Pan, Jianping
    Cai, Lin
    Shen, Xuemin
    Mark, Jon W.
    COMPUTER NETWORKS, 2007, 51 (03) : 853 - 865