Skip to main content

2018 | OriginalPaper | Buchkapitel

Comparative Analysis of Authentication and Access Control Protocols Against Malicious Attacks in Wireless Sensor Networks

verfasst von : Vikas Mittal, Sunil Gupta, Tanupriya Choudhury

Erschienen in: Smart Computing and Informatics

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The major goal of this analysis is to compare and find out the appropriate protocol for research. According to our analysis, the access control method and authentication used in the wireless sensor networks in some protocols is costlier in the security and message exchange. In analysis, we find out that various security solutions are based on public key cryptography which is highly expensive, susceptible to replay and denial of service attacks. Most of access control protocols depend on the key pre-distribution mechanisms which are combined together with either a one-way key chain or a pseudorandom function. The solution for the access control inculcates various vulnerabilities of the mechanism on which it is developed and its security features also rely on the same. This paper provides detailed analysis over improvements for all the recent protocols that cover the shortcomings of each other.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, I.F., Su, W., Sankarasubramaniam Y., and Cayirci, E., “A survey on sensor networks”, IEEE communication magazine, Vol. 40, No. 8, August, pp. 102–114. Akyildiz, I.F., Su, W., Sankarasubramaniam Y., and Cayirci, E., “A survey on sensor networks”, IEEE communication magazine, Vol. 40, No. 8, August, pp. 102–114.
2.
Zurück zum Zitat Karlof, C. and Wagner, D., “Secure routing in wireless sensor networks: attacks and countermeasures”, Adhoc networks journal, Vol. 1, No. 2, pp. 293315, 2004. Karlof, C. and Wagner, D., “Secure routing in wireless sensor networks: attacks and countermeasures”, Adhoc networks journal, Vol. 1, No. 2, pp. 293315, 2004.
3.
Zurück zum Zitat Zhi, S., Jian-Xin, L., Zhi-Yong, F., Zheu-Fu, C. and Guang-Quan, X., “On the security and improvement of a two-factor user authentication scheme in wireless sensor network”, Vol. 17, No. 5, pp. 895–905. Zhi, S., Jian-Xin, L., Zhi-Yong, F., Zheu-Fu, C. and Guang-Quan, X., “On the security and improvement of a two-factor user authentication scheme in wireless sensor network”, Vol. 17, No. 5, pp. 895–905.
4.
Zurück zum Zitat Cheng, Y., Alan, D., and Wang, H., “Secure access control method for wireless sensor networks”, International Journal of distributed sensor networks, Vol. 2015, No. 1, pp. 1–6. Cheng, Y., Alan, D., and Wang, H., “Secure access control method for wireless sensor networks”, International Journal of distributed sensor networks, Vol. 2015, No. 1, pp. 1–6.
5.
Zurück zum Zitat Zhu, S., Setia, S. and Jajodia, A., “LEAP: Efficient security mechanisms for large-scale distributed sensor networks”, Proceedings of the ACM conference on computer and communications security (CCS ’03), October, pp. 89–97, 2003. Zhu, S., Setia, S. and Jajodia, A., “LEAP: Efficient security mechanisms for large-scale distributed sensor networks”, Proceedings of the ACM conference on computer and communications security (CCS ’03), October, pp. 89–97, 2003.
6.
Zurück zum Zitat Khan, M. K. and Alghathbar, K., “Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks”, Sensors, Vol. 10, No. 3, pp. 2450–2459. Khan, M. K. and Alghathbar, K., “Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks”, Sensors, Vol. 10, No. 3, pp. 2450–2459.
7.
Zurück zum Zitat Arikumar, K.S. and Thirumoorthy, K., “Improved user authentication in wireless sensor networks”, Proceeding of ICETECT, March, pp. 1010–1015. Arikumar, K.S. and Thirumoorthy, K., “Improved user authentication in wireless sensor networks”, Proceeding of ICETECT, March, pp. 1010–1015.
8.
Zurück zum Zitat Yeh, H.L., Chen, T.H., Liu, P., Kim, T.H. and Wei, H.W., “A secured authentication protocol for wireless sensor networks using elliptic curves cryptography”, Sensors, Vol. 11, No. 5, pp. 4767–4779. Yeh, H.L., Chen, T.H., Liu, P., Kim, T.H. and Wei, H.W., “A secured authentication protocol for wireless sensor networks using elliptic curves cryptography”, Sensors, Vol. 11, No. 5, pp. 4767–4779.
9.
Zurück zum Zitat Das, M.L., “Two-factor user authentication in wireless sensor networks”, IEEE transactions on wireless communications, Vol. 8, No. 3, pp. 1086–1090. Das, M.L., “Two-factor user authentication in wireless sensor networks”, IEEE transactions on wireless communications, Vol. 8, No. 3, pp. 1086–1090.
10.
Zurück zum Zitat Sarika, T. and Nawaz, S.S, “Multi-factor user authentication in wireless sensor networks”, International journal of computer science and telecommunications, Vol. 2, No. 6, pp. 59–63. Sarika, T. and Nawaz, S.S, “Multi-factor user authentication in wireless sensor networks”, International journal of computer science and telecommunications, Vol. 2, No. 6, pp. 59–63.
11.
Zurück zum Zitat Zhou, Y., Zhang, Y. and Fang, Y., “Access control in wireless sensor networks”, Adhoc networks, Vol. 5, No. 1, pp. 313. Zhou, Y., Zhang, Y. and Fang, Y., “Access control in wireless sensor networks”, Adhoc networks, Vol. 5, No. 1, pp. 313.
12.
Zurück zum Zitat Ko, L.C. A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks. Proceedings of IEEE ISWCS, Reykjavik, Iceland; 2008; pp. 608–612. Ko, L.C. A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks. Proceedings of IEEE ISWCS, Reykjavik, Iceland; 2008; pp. 608–612.
13.
Zurück zum Zitat Huang, H.F., “A novel access control protocol for secure sensor networks”, Computer standards and interfaces, Vol. 31, No. 2, pp. 272–276. Huang, H.F., “A novel access control protocol for secure sensor networks”, Computer standards and interfaces, Vol. 31, No. 2, pp. 272–276.
14.
Zurück zum Zitat Lee, H., Shin, K. and Lee, D., “PACPs: Practical access control protocol for wireless sensor networks”, IEEE transaction on consumer electronics, Vol. 58, No. 2, pp. 491–499. Lee, H., Shin, K. and Lee, D., “PACPs: Practical access control protocol for wireless sensor networks”, IEEE transaction on consumer electronics, Vol. 58, No. 2, pp. 491–499.
Metadaten
Titel
Comparative Analysis of Authentication and Access Control Protocols Against Malicious Attacks in Wireless Sensor Networks
verfasst von
Vikas Mittal
Sunil Gupta
Tanupriya Choudhury
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5547-8_27

Neuer Inhalt