A Secure Authentication and Key Management Scheme for Wireless Sensor Networks

被引:1
|
作者
Khan, Sarmadullah [1 ]
Khan, Rafiullah [2 ]
机构
[1] CECOS Univ, Dept Elect, Peshawar, Pakistan
[2] Univ Genoa, Commun & Networks Lab, Genoa, Italy
来源
关键词
Wireless sensor networks; Cryptography; Key management;
D O I
10.1007/978-3-319-17136-4_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mobility increased the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Since, key management plays an important role in securing both information and connectivity, a proper authentication and key management scheme is required in mobility enabled applications where the authentication of a node with the network is a critical issue. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution by using MATLAB (analytically) and by simulation (OMNET++ simulator) to show that it has less memory requirement and has good network connectivity and resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.
引用
收藏
页码:51 / 60
页数:10
相关论文
共 50 条
  • [31] A user authentication and key agreement scheme for heterogeneous wireless sensor networks
    Yan L.-L.
    Chang Y.
    Zhang S.-B.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2017, 46 (01): : 55 - 60
  • [32] A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks
    Jen-Yan Huang
    I-En Liao
    Hao-Wen Tang
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [33] A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks
    Huang, Jen-Yan
    Liao, I-En
    Tang, Hao-Wen
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [34] A hierarchical key management and authentication method for wireless sensor networks
    Alimoradi, Pourya
    Barati, Ali
    Barati, Hamid
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (06)
  • [35] A secure group key management scheme for wireless cellular networks
    Um, Hwayoung
    Delp, Edward J.
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 414 - +
  • [36] Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment
    Jangirala, Srinivas
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 45 - 65
  • [37] Efficient Key Management Scheme in Wireless Sensor Networks
    Zhao, Shen
    Zheng, Jun
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1132 - 1136
  • [38] Centralized Key Management Scheme in Wireless Sensor Networks
    Saber Banihashemian
    Abbas Ghaemi Bafghi
    Mohammad Hossien Yaghmaee Moghaddam
    Wireless Personal Communications, 2011, 60
  • [39] Cluster Key Management Scheme for Wireless Sensor Networks
    Zhao, Qisheng
    Liu, Xiaoming
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE, 2014, : 90 - 93
  • [40] An optimal key management scheme for wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Rong, Bo
    Lugo, Hector
    Tipper, David
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 1 - +