Authentication of Mobile Wireless Sensor Networks

被引:0
|
作者
Abd-Eldayem, Sanaa. S. [1 ]
Rizk, M. R. M. [2 ]
Mokhtar, M. A. [2 ]
机构
[1] Pharos Univ Alex, Elect Dept, Alexandria, Egypt
[2] Univ Alexandria, Elect Dept, Alexandria, Egypt
关键词
Wireless Sensor Network; Authentication; Key; Mobile node;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Network (WSN) contains a lot of sensors called nodes or motes. These sensors sense the environmental data, according to the application, and then communicate with each other, and finally send these data or readings back to the base station. WSN security is an important issue, since motes are usually left to operate unattended in the environment where they were deployed. Intruder may inject false data into the network, thus strong security mechanisms are needed to be implemented in order to protect the network against malicious intruder or attacks. This paper proposed a key distribution and authentication protocol designed to achieve some security requirements of WSNs. The paper introduces a simple protocol for shared key discovery and authentication of massage and entity. The work assumes mobile nodes and proposed a re-authentication protocol for nodes to re-authenticate themselves in the new location. The efficiency of the proposed protocol has been ensured in terms of energy consumption, packet size and the security requirements achieved.
引用
收藏
页码:71 / 76
页数:6
相关论文
共 50 条
  • [1] Authentication in Flat Wireless Sensor Networks with Mobile Nodes
    Saleh, Mohamed
    El-Meniawy, Nagwa
    Sourour, Essam
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 208 - 212
  • [2] A Secure Authentication Protocol among Mobile Phone and Wireless Sensor Networks
    Bruce, Ndibanje
    Lee, Hoon Jae
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 52 - 59
  • [3] Data Authentication Scheme for Unattended Wireless Sensor Networks against a Mobile Adversary
    Reddy, Sasi Kiran V. L.
    Ruj, Sushmita
    Nayak, Amiya
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1836 - 1841
  • [4] Enhanced Secure Authentication for Mobile RFID Healthcare System in Wireless Sensor Networks
    Kim, Jung Tae
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 190 - 197
  • [6] Mobile node authentication using key distribution scheme in wireless sensor networks
    Shaila, K.
    Manjula, S. H.
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 12 (01) : 34 - 45
  • [7] Fast authentication in wireless sensor networks
    Benzaid, Chafika
    Lounis, Karim
    Al-Nemrat, Ameer
    Badache, Nadjib
    Alazab, Mamoun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 362 - 375
  • [8] On broadcast authentication in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zeng, Kai
    Moran, Patrick J.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (11) : 4136 - 4144
  • [9] Challenges and Authentication in Wireless Sensor Networks
    Jayanthiladevi, A.
    Suma, S.
    Lalitha, T.
    [J]. 2013 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN VLSI, EMBEDDED SYSTEM, NANO ELECTRONICS AND TELECOMMUNICATION SYSTEM (ICEVENT 2013), 2013,
  • [10] On broadcast authentication in wireless sensor networks
    Ren, Kui
    Zeng, Kai
    Lou, Wenjing
    Moran, Patrick J.
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 502 - 514