Reauthentication scheme for mobile wireless sensor networks

被引:6
|
作者
Mohindru, Vandana [1 ]
Bhatt, Ravindara [2 ]
Singh, Yashwant [3 ]
机构
[1] Chandigarh Grp Coll Coll Engn, Dept Comp Sci & Engn, Landran, Mohali, India
[2] Jaypee Univ Informat Technol, Dept Comp Sci & Engn, Solan, HP, India
[3] Cent Univ Jammu, Dept Comp Sci & Informat Technol, Bagla, Jammu & Kashmir, India
关键词
Wireless Sensor Networks (WSNs); Mobile node; Reauthentication; Mobile Wireless Sensor Networks (MWSNs); Voronoi regions; Mobile Healthcare; Security; HEALTH; AUTHENTICATION; ALGORITHM; SECURITY; PRIVACY;
D O I
10.1016/j.suscom.2019.07.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks consist of static as well as mobile sensor nodes. Due to deployment of the sensor nodes, generally in an unattended and hostile environment, it becomes a critical issue as well as a cumbersome task to safeguard these nodes against various kinds of security attacks. The mobility of sensor nodes is a significant issue because these nodes continuously move from one region to another region and reconnect to other sensor nodes. Reauthentication and locating the node movement are the primary security issues in Mobile Wireless Sensor Networks (MWSNs). Many previous security algorithms available in the literature only consider the issues of static sensor nodes. In this paper, we propose an energy efficient mobile node authentication algorithm. For mobile node authentication, we design the reauthentication approach for mobile nodes and also design an authentication framework for securing MWSNs. The proposed protocol is compared with existing mobile node authentication protocols available in the literature. We observe that the proposed protocol provides low overhead while achieving the security requirements for mobile wireless sensor networks. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:158 / 166
页数:9
相关论文
共 50 条
  • [31] A Mobile Agents Control Scheme for Multiple Sinks in Dense Mobile Wireless Sensor Networks
    Goto, Keisuke
    Sasaki, Yuya
    Hara, Takahiro
    Nishio, Shojiro
    [J]. MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 52 - 65
  • [32] Optimal Mobile Sink Selection Scheme for Multiple Sink Mobile Wireless Sensor Networks
    Abuarqoub, Abdelrahman
    [J]. 2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2015, : 169 - 172
  • [33] Fnergy Efficient Cluster Based Routing Scheme for Mobile Wireless Sensor Networks
    Arshad, Muhammad
    Aalsalem, Mohamed Y.
    Siddqui, Farhan A.
    [J]. 2014 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT AND ADVANCED SYSTEMS (ICIAS 2014), 2014,
  • [34] Actuator Energy Guaranteed Mobile Charging Scheme for Wireless Sensor and Actuator Networks
    Xu, Fulong
    Lu, Hede
    [J]. 2022 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND ARTIFICIAL INTELLIGENCE (CCAI 2022), 2022, : 211 - 216
  • [35] Low communication cost (LCC) scheme for localizing mobile wireless sensor networks
    Ammar M. A. Abu znaid
    Mohd. Yamani Idna Idris
    Ainuddin Wahid Abdul Wahab
    Liana Khamis Qabajeh
    Omar Adil Mahdi
    [J]. Wireless Networks, 2017, 23 : 737 - 747
  • [36] An Energy Efficient Clustering Scheme of Mobile Sink Node in Wireless Sensor Networks
    Young-bok, Cho
    Sang-ho, Lee
    [J]. PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, ELECTRONICS, CONTROL AND SIGNAL PROCESSING (CSECS'08), 2008, : 317 - +
  • [37] Adaptive data collection scheme for tracking mobile target in wireless sensor networks
    Zhou, Ling
    Sen, Arunabha
    [J]. 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 112 - +
  • [38] A Localization Scheme for Wireless Sensor Networks Using Mobile Anchors With Directional Antennas
    Ou, Chia-Ho
    [J]. IEEE SENSORS JOURNAL, 2011, 11 (07) : 1607 - 1616
  • [39] An adaptive stabilizing imposter detection scheme for distributed mobile wireless sensor networks
    Alrashed, Ebrahim A.
    Karaata, Mehmet H.
    Hamdan, Ali
    Albahar, Badour
    [J]. AD HOC NETWORKS, 2017, 65 : 1 - 12
  • [40] Data Authentication Scheme for Unattended Wireless Sensor Networks against a Mobile Adversary
    Reddy, Sasi Kiran V. L.
    Ruj, Sushmita
    Nayak, Amiya
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1836 - 1841