Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks

被引:16
|
作者
Liu, Dengzhi [1 ]
Shen, Jian [1 ,2 ,3 ,4 ]
Wang, Anxi [1 ]
Wang, Chen [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[2] Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Jiangsu, Peoples R China
[3] Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Jiangsu, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
美国国家科学基金会;
关键词
HWSNs; hierarchical wireless sensor networks; node authentication; lightweight; practical; KEY MANAGEMENT SCHEME; ALGORITHM;
D O I
10.1504/IJSNET.2018.092638
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are many concerns about the sensitivity and the privacy of data in hierarchical wireless sensor networks (HWSNs) because the low-cost nodes are neither tamper-proof nor capable of performing public key cryptography efficiently. In existing studies, many researchers only focus on the existence of single node in the network, while the arrangement that multiple nodes attached to one cluster is out of consideration. In this paper, we propose a lightweight and practical node clustering authentication protocol for HWSNs. As we assume that one cluster to be authenticated is attached with a group of nodes. The cluster head (CH) node takes full control of the entire authentication process in its cluster. In addition, the protocol is proved to offer enough security assurances and have resistance to various attacks. The regular operation of the network will not be affected or damaged by the incidents occurred during the authentication process.
引用
收藏
页码:95 / 102
页数:8
相关论文
共 50 条
  • [1] A Review on Lightweight Node Authentication Algorithms in Wireless Sensor Networks
    Mohindru, Vandana
    Singh, Yashwant
    Bhatt, Ravindara
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 517 - 521
  • [2] A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3808 - 3819
  • [3] Routing Protocol for Hierarchical Clustering Wireless Sensor Networks
    Omar, Alghanmi Ali
    Yu, ChunGun
    Kim, ChongGun
    [J]. UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 349 - 359
  • [4] Multilevel Hierarchical Clustering protocol for wireless sensor networks
    Ateya, Abdelhamied A.
    Sayed, Mohammed S.
    Abdalla, Mahmoud I.
    [J]. 2014 INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICET), 2014,
  • [5] LAP: A Lightweight Authentication Protocol for Smart Dust Wireless Sensor Networks
    Sharifi, Mohsen
    Kashi, Saeed Sedighian
    Ardakani, Saeed Pourroostaei
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, : 258 - 265
  • [6] Hierarchical distributed management clustering protocol for wireless sensor networks
    Shahraki, Amin
    Rafsanjani, Marjan Kuchaki
    Saeid, Arsham Borumand
    [J]. TELECOMMUNICATION SYSTEMS, 2017, 65 (01) : 193 - 214
  • [7] Hierarchical distributed management clustering protocol for wireless sensor networks
    Amin Shahraki
    Marjan Kuchaki Rafsanjani
    Arsham Borumand Saeid
    [J]. Telecommunication Systems, 2017, 65 : 193 - 214
  • [8] A lightweight identity authentication protocol for wireless networks
    Badra, M
    Serhrouchni, A
    Urien, P
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (17) : 1738 - 1745
  • [9] A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
    Mo, Jiaqing
    Chen, Hang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [10] Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
    Roselin, Annie Gilda
    Nanda, Priyadarsi
    Nepal, Surya
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 371 - 378