Skip to main content

2020 | OriginalPaper | Buchkapitel

Diffie-Hellman Algorithm Pedestal to Authenticate Nodes in Wireless Sensor Network

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Securing the network in the unsupervised environment is one of the prior issues. To address the issue authentication and encryption are adopted. The paper uses location information to generate an authentication key and bring security to the network. The Diffie-Hellman algorithm plays a key role in generating keys in the paper. Encryption keys are generated using the same. The technique adopted evaluates the nodes in communication and secures the transmitted data packets. The work minimizes the forge by 0.84% and 1.69% compared to previous work. The proposed work minimizes replay attack by 2.9% and 0.16% compared to previous work. The work conserves energy by 16.6% and 0.84% compared to the previous work. The proposal increases reliability 1.35% and 0.33% compared with previous work. The measure adheres to the forward and backward secrecy of the keys.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2008)CrossRef Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2008)CrossRef
2.
Zurück zum Zitat Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRef Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRef
3.
Zurück zum Zitat Xu, N.: A survey of sensor network applications. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRef Xu, N.: A survey of sensor network applications. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRef
4.
Zurück zum Zitat Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: a survey. Secur. Distrib. Grid Mobile Pervasive Comput. 1, 367 (2007) Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: a survey. Secur. Distrib. Grid Mobile Pervasive Comput. 1, 367 (2007)
5.
Zurück zum Zitat Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009)CrossRef Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009)CrossRef
6.
Zurück zum Zitat Perrig, A., et al.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)CrossRef Perrig, A., et al.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)CrossRef
7.
Zurück zum Zitat Bohge, M., Trappe, W.: An authentication framework for hierarchical ad hoc sensor networks. In: 2nd ACM Workshop on Wireless Security, pp. 79–87 (2003) Bohge, M., Trappe, W.: An authentication framework for hierarchical ad hoc sensor networks. In: 2nd ACM Workshop on Wireless Security, pp. 79–87 (2003)
8.
Zurück zum Zitat Jan, M., Nanda, P., Usman, M., He, X.: PAWN: a payload based mutual authentication scheme for wireless sensor networks. Concurr. Comput.: Pract. Exp. 29, e3986 (2016)CrossRef Jan, M., Nanda, P., Usman, M., He, X.: PAWN: a payload based mutual authentication scheme for wireless sensor networks. Concurr. Comput.: Pract. Exp. 29, e3986 (2016)CrossRef
9.
Zurück zum Zitat Chen, T.-H., Shih, W.-K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010)CrossRef Chen, T.-H., Shih, W.-K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010)CrossRef
10.
Zurück zum Zitat Abraham, J., Ramanatha, K.S.: An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks. In: Third International Conference on Wireless and Optical Communication Networks, pp. 5–10 (2006) Abraham, J., Ramanatha, K.S.: An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks. In: Third International Conference on Wireless and Optical Communication Networks, pp. 5–10 (2006)
11.
Zurück zum Zitat Ibriq, J., Mahgoub, I.: A hierarchical key establishment scheme for wireless sensor networks. In: 21st International Conference on Advanced Networking and Applications, pp. 210–219 (2007) Ibriq, J., Mahgoub, I.: A hierarchical key establishment scheme for wireless sensor networks. In: 21st International Conference on Advanced Networking and Applications, pp. 210–219 (2007)
12.
Zurück zum Zitat Han, K., Shon, T., Kim, K.: Efficient mobile sensor authentication in smart home and WPAN. IEEE Trans. Consum. Electron. 56(2), 591–596 (2010)CrossRef Han, K., Shon, T., Kim, K.: Efficient mobile sensor authentication in smart home and WPAN. IEEE Trans. Consum. Electron. 56(2), 591–596 (2010)CrossRef
13.
Zurück zum Zitat Cheikhrouhou, O., Koubaa, A., Boujelbenl, M., Abid, M.: A lightweight user authentication scheme for WSN. In: International Conference on Sensor Networks, Ubiquitious, and Trustworthy Computing, pp. 1–7 (2010) Cheikhrouhou, O., Koubaa, A., Boujelbenl, M., Abid, M.: A lightweight user authentication scheme for WSN. In: International Conference on Sensor Networks, Ubiquitious, and Trustworthy Computing, pp. 1–7 (2010)
14.
Zurück zum Zitat Butun, I., Sankar, R.: Advanced two tier user authentication scheme for heterogeneous wireless sensor networks. In: IEEE Consumer Communications and Networking Conference, pp. 169–171 (2011) Butun, I., Sankar, R.: Advanced two tier user authentication scheme for heterogeneous wireless sensor networks. In: IEEE Consumer Communications and Networking Conference, pp. 169–171 (2011)
15.
Zurück zum Zitat Chuchaisri, P., Newman, R.: Fast response PKC-based broadcast authentication in wireless sensor network. In: 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 1–10 (2010) Chuchaisri, P., Newman, R.: Fast response PKC-based broadcast authentication in wireless sensor network. In: 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 1–10 (2010)
16.
Zurück zum Zitat Yao, T., Fukunaga, S., Nakai, T.: Reliable broadcast authentication in WSN. In: EUC 2006 Workshops, pp. 271–280 (2006) Yao, T., Fukunaga, S., Nakai, T.: Reliable broadcast authentication in WSN. In: EUC 2006 Workshops, pp. 271–280 (2006)
17.
Zurück zum Zitat Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanishms in large scale distributed networks. In: 10th ACM Conference on Computer and Communications Security, pp. 62–72 (2004) Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanishms in large scale distributed networks. In: 10th ACM Conference on Computer and Communications Security, pp. 62–72 (2004)
18.
Zurück zum Zitat Ning, P., Liu, A., Du, W.: Mitigating DOS attacks against broadcast authentication in WSN. ACM Trans. Sens. Netw. 4(1), 1 (2008)CrossRef Ning, P., Liu, A., Du, W.: Mitigating DOS attacks against broadcast authentication in WSN. ACM Trans. Sens. Netw. 4(1), 1 (2008)CrossRef
19.
Zurück zum Zitat Qiu, Y., Zhou, J., Baek, J., Lopez, J.: Authentication and key establishment in dynamic wireless sensor network. Sensors 10(4), 3718–3731 (2010)CrossRef Qiu, Y., Zhou, J., Baek, J., Lopez, J.: Authentication and key establishment in dynamic wireless sensor network. Sensors 10(4), 3718–3731 (2010)CrossRef
20.
Zurück zum Zitat Du, W., Wang, R., Liu, X.: ShortPK: a short term public key scheme for broadcast authentication in WSN. ACM Trans. Sens. Netw. 4(1), 9 (2009) Du, W., Wang, R., Liu, X.: ShortPK: a short term public key scheme for broadcast authentication in WSN. ACM Trans. Sens. Netw. 4(1), 9 (2009)
21.
Zurück zum Zitat Cui, B., Wang, Z., Zhao, B., Liang, X., Ding, Y.: Enhanced Key Management Protocol for Wireless Sensor Network, pp. 1–10. Hindawi Publishing Corporation, London (2015) Cui, B., Wang, Z., Zhao, B., Liang, X., Ding, Y.: Enhanced Key Management Protocol for Wireless Sensor Network, pp. 1–10. Hindawi Publishing Corporation, London (2015)
22.
Zurück zum Zitat Kumar, S., Singh, R.K.: Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN. Int. J. Commun. Netw. Distrib. Syst. 17(2), 189–201 (2016)CrossRef Kumar, S., Singh, R.K.: Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN. Int. J. Commun. Netw. Distrib. Syst. 17(2), 189–201 (2016)CrossRef
23.
Zurück zum Zitat Chatterjee, K., De, A., Gupta, D.: A secure and efficient authentication protocol in wireless sensor network. Wirel. Pers. Commun. 81(1), 17–37 (2015)CrossRef Chatterjee, K., De, A., Gupta, D.: A secure and efficient authentication protocol in wireless sensor network. Wirel. Pers. Commun. 81(1), 17–37 (2015)CrossRef
24.
Zurück zum Zitat Chung, T., Roedig, U.: DHB-KEY: an efficient key distribution scheme for wireless sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (2008) Chung, T., Roedig, U.: DHB-KEY: an efficient key distribution scheme for wireless sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (2008)
25.
Zurück zum Zitat Xie, Y., Li, X., Zhang, S., Li, Y.: $iCLAS$: an improved certificateless aggregate signature scheme for healthcare wireless sensor network. IEEE Access 7, 15170–15182 (2019)CrossRef Xie, Y., Li, X., Zhang, S., Li, Y.: $iCLAS$: an improved certificateless aggregate signature scheme for healthcare wireless sensor network. IEEE Access 7, 15170–15182 (2019)CrossRef
26.
Zurück zum Zitat Zhan, F., Yao, N., Gao, Z., Tan, G.: A novel key generation method for wireless sensor networks based on system of equations. J. Netw. Comput. Appl. 82, 114–127 (2017)CrossRef Zhan, F., Yao, N., Gao, Z., Tan, G.: A novel key generation method for wireless sensor networks based on system of equations. J. Netw. Comput. Appl. 82, 114–127 (2017)CrossRef
27.
Zurück zum Zitat Van Torre, P.: Channel-based key generation for encrypted body-worn wireless sensor networks. Sensors 16(9), 1453 (2016)CrossRef Van Torre, P.: Channel-based key generation for encrypted body-worn wireless sensor networks. Sensors 16(9), 1453 (2016)CrossRef
28.
Zurück zum Zitat Heigl, M., Schramm, M., Fiala, D.: A lightweight quantum-safe security concept for wireless sensor network communication. In: IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 906–911 (2019) Heigl, M., Schramm, M., Fiala, D.: A lightweight quantum-safe security concept for wireless sensor network communication. In: IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 906–911 (2019)
29.
Zurück zum Zitat Schurgers, C., Kulkarni, G., Srivastava, M.B.: Distributed assignment of encoded MAC address in sensor network. In: 2nd ACM International symposium on Mobile Adhoc Networking and Computing, pp. 295–298 (2001) Schurgers, C., Kulkarni, G., Srivastava, M.B.: Distributed assignment of encoded MAC address in sensor network. In: 2nd ACM International symposium on Mobile Adhoc Networking and Computing, pp. 295–298 (2001)
30.
Zurück zum Zitat Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad-hoc networks. J. Wirel. Netw. Secur. 4, 159–180 (2007)CrossRef Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad-hoc networks. J. Wirel. Netw. Secur. 4, 159–180 (2007)CrossRef
31.
Zurück zum Zitat Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds.): Futuristic Trends in Network and Communication in Computer and Information Science, vol. 958. Springer, Singapore (2018) Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds.): Futuristic Trends in Network and Communication in Computer and Information Science, vol. 958. Springer, Singapore (2018)
32.
Zurück zum Zitat Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), vol. 1, pp. 8-pp. IEEE (2006) Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), vol. 1, pp. 8-pp. IEEE (2006)
Metadaten
Titel
Diffie-Hellman Algorithm Pedestal to Authenticate Nodes in Wireless Sensor Network
verfasst von
N. Ambika
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-40305-8_17

Neuer Inhalt