Skip to main content
Top
Published in: Wireless Networks 7/2020

26-05-2020

A novel node authentication protocol connected with ECC for heterogeneous network

Authors: Purushottam G. Chilveri, Manoj S. Nagmode

Published in: Wireless Networks | Issue 7/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Unlike regular wireless networks like Mobile Ad hoc NETworks (MANET) can be exploited instinctively devoid of necessitating any centralized administration or available network infrastructure. In such networks, the mobile nodes perform as relays to assist multi-hop communications and, in most cases, they are accountable for the entire networking functions. MANET is a very challenging task owing to the actuality that these systems may be subjected to attacks causing the network malicious. Among single- server and multi-server authentications, this paper intends to focus on multi-server authentication process in MANET or WSN or any heterogeneous network, which includes a secure protocol that provides a proper communication link between the nodes. In a single server network, both the credentials and authenticating procedure are handled by a single server. On the other hand, in a multi-server network, the credentials and authenticating procedure are handled by separate servers, and hence practically it is more robust against attacks. Hence, this paper develops a security protocol using Elliptic Curve Cryptography (ECC) in prime field. By adopting hash function, a secure way for key exchange is provided. Before transmitting the message from one node to another, it has to be ensured whether it is an authorized node or not. For authorizing purpose, a novel authenticating algorithm is developed based on two servers, a master server and normal server. Accordingly, the credentials and the processing steps are separated in such a way that compromising one of the servers never pose any threat to the whole authentication system. Initially, a node should register its credentials to the register centre, and those credentials are distributed to the server by a secure distribution algorithm where no hacking could be possible. The implemented technique is analyzed in terms of cost and security, and the results are obtained.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hamouid, K., & Adi, K. (2015). Efficient certificateless web-of-trust model for public-key authentication in MANET. Computer Communications, 63, 24–39.CrossRef Hamouid, K., & Adi, K. (2015). Efficient certificateless web-of-trust model for public-key authentication in MANET. Computer Communications, 63, 24–39.CrossRef
2.
go back to reference Yeun, C. Y., Han, K., Vo, D. L., & Kim, K. (2008). Secure authenticated group key agreement protocol in the MANET environment. Information Security Technical Report, 13(3), 158–164.CrossRef Yeun, C. Y., Han, K., Vo, D. L., & Kim, K. (2008). Secure authenticated group key agreement protocol in the MANET environment. Information Security Technical Report, 13(3), 158–164.CrossRef
3.
go back to reference Li, X., Niu, J., Kumari, S., Wu, F., & Choo, K. K. R. (2017). A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications, 103, 194–204.CrossRef Li, X., Niu, J., Kumari, S., Wu, F., & Choo, K. K. R. (2017). A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications, 103, 194–204.CrossRef
4.
go back to reference Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147–169.CrossRef Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147–169.CrossRef
5.
go back to reference Ramachandran, S., & Shanmugam, V. (2017). A two way authentication using bilinear mapping function for wireless sensor networks. Computers & Electrical Engineering, 59, 242–249.CrossRef Ramachandran, S., & Shanmugam, V. (2017). A two way authentication using bilinear mapping function for wireless sensor networks. Computers & Electrical Engineering, 59, 242–249.CrossRef
6.
go back to reference Wu, F., Xu, L., Kumari, S., Li, X., & Das, A. K. (2017). An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. Journal of Network and Computer Applications, 89, 72–85.CrossRef Wu, F., Xu, L., Kumari, S., Li, X., & Das, A. K. (2017). An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. Journal of Network and Computer Applications, 89, 72–85.CrossRef
7.
go back to reference Wu, F., Li, X., Sangaiah, A. K., Xu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727–737.CrossRef Wu, F., Li, X., Sangaiah, A. K., Xu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727–737.CrossRef
8.
go back to reference Amin, R., & Biswa, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58–80.CrossRef Amin, R., & Biswa, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58–80.CrossRef
9.
go back to reference Hu, C.-C., Lai, C.-F., Hou, J.-G., & Huang, Y.-M. (2017). Timely scheduling algorithm for P2P streaming over MANETs. Computer Networks, 127, 56–67.CrossRef Hu, C.-C., Lai, C.-F., Hou, J.-G., & Huang, Y.-M. (2017). Timely scheduling algorithm for P2P streaming over MANETs. Computer Networks, 127, 56–67.CrossRef
10.
go back to reference Shah, N., Abid, S. A., Qian, D., & Mehmood, W. (2017). A survey of P2P content sharing in MANETs. Computers & Electrical Engineering, 57, 55–68.CrossRef Shah, N., Abid, S. A., Qian, D., & Mehmood, W. (2017). A survey of P2P content sharing in MANETs. Computers & Electrical Engineering, 57, 55–68.CrossRef
11.
go back to reference Sarkar, S., & Datta, R. (2017). A game theoretic framework for stochastic multipath routing in self-organized MANETs. Pervasive and Mobile Computing, 39, 117–134.CrossRef Sarkar, S., & Datta, R. (2017). A game theoretic framework for stochastic multipath routing in self-organized MANETs. Pervasive and Mobile Computing, 39, 117–134.CrossRef
12.
go back to reference Usha, G., RajeshBabu, M., & SaravanaKumar, S. (2017). Dynamic anomaly detection using cross layer security in MANET. Computers & Electrical Engineering, 59, 231–241.CrossRef Usha, G., RajeshBabu, M., & SaravanaKumar, S. (2017). Dynamic anomaly detection using cross layer security in MANET. Computers & Electrical Engineering, 59, 231–241.CrossRef
13.
go back to reference AlMojamed, M., & Kolberg, M. (2016). Structured peer-to-peer overlay deployment on MANET: a survey. Computer Networks, 96, 29–47.CrossRef AlMojamed, M., & Kolberg, M. (2016). Structured peer-to-peer overlay deployment on MANET: a survey. Computer Networks, 96, 29–47.CrossRef
14.
go back to reference Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2018). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 90–100. Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2018). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 90–100.
15.
go back to reference Azni, A. H., Ahmad, R., Noh, Z. A. M., Hazwani, F., & Hayaati, N. (2015). Systematic review for network survivability analysis in MANETS. Procedia - Social and Behavioral Sciences, 195, 1872–1881.CrossRef Azni, A. H., Ahmad, R., Noh, Z. A. M., Hazwani, F., & Hayaati, N. (2015). Systematic review for network survivability analysis in MANETS. Procedia - Social and Behavioral Sciences, 195, 1872–1881.CrossRef
16.
go back to reference Qiu, T., Chen, N., Li, K., Qiao, D., & Fu, Z. (2017). Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Networks, 55, 143–152.CrossRef Qiu, T., Chen, N., Li, K., Qiao, D., & Fu, Z. (2017). Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Networks, 55, 143–152.CrossRef
17.
go back to reference Xu, Y., Liu, J., Shen, Y., Jiang, X., & Shiratori, N. (2017). Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Computer Networks, 123, 77–87.CrossRef Xu, Y., Liu, J., Shen, Y., Jiang, X., & Shiratori, N. (2017). Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Computer Networks, 123, 77–87.CrossRef
18.
go back to reference Banerjee, A., King, C.-T., & Hsiao, H.-C. (2017). On state maintenance in cluster-based mobile ad-hoc networks. Ad Hoc Networks, 66, 95–109.CrossRef Banerjee, A., King, C.-T., & Hsiao, H.-C. (2017). On state maintenance in cluster-based mobile ad-hoc networks. Ad Hoc Networks, 66, 95–109.CrossRef
19.
go back to reference Halunen, K., Häikiö, J., & Vallivaara, V. (2017). Evaluation of user authentication methods in the gadget-free world. Pervasive and Mobile Computing, 40, 220–241.CrossRef Halunen, K., Häikiö, J., & Vallivaara, V. (2017). Evaluation of user authentication methods in the gadget-free world. Pervasive and Mobile Computing, 40, 220–241.CrossRef
20.
go back to reference Kumar, V., Park, J. M., & Bian, K. (2017). Transmitter authentication using hierarchical modulation in dynamic spectrum sharing. Journal of Network and Computer Applications, 91, 52–60.CrossRef Kumar, V., Park, J. M., & Bian, K. (2017). Transmitter authentication using hierarchical modulation in dynamic spectrum sharing. Journal of Network and Computer Applications, 91, 52–60.CrossRef
21.
go back to reference Chang, C.-C., Wu, H.-L., & Sun, C.-Y. (2017). Notes on “Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 38, 275–278.CrossRef Chang, C.-C., Wu, H.-L., & Sun, C.-Y. (2017). Notes on “Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 38, 275–278.CrossRef
22.
go back to reference Pérez-Caballero, G., Andrade, J. M., Olmos, P., Molina, Y., & Miguel-Cruz, F. (2017). Authentication of tequilas using pattern recognition and supervised classification. TrAC Trends in Analytical Chemistry, 94, 117–129.CrossRef Pérez-Caballero, G., Andrade, J. M., Olmos, P., Molina, Y., & Miguel-Cruz, F. (2017). Authentication of tequilas using pattern recognition and supervised classification. TrAC Trends in Analytical Chemistry, 94, 117–129.CrossRef
23.
go back to reference Shankar, V., Singh, K., & Kumar, A. (2016). IPCT: A scheme for mobile authentication. Perspectives in Science, 8, 522–524.CrossRef Shankar, V., Singh, K., & Kumar, A. (2016). IPCT: A scheme for mobile authentication. Perspectives in Science, 8, 522–524.CrossRef
24.
go back to reference Ugrovatov, A., Bakhtin, A., Volkov, A., Galenko, V., & Muratchaev, S. (2016). Using scenarios for performance analysis of MANET protocols in space operations. In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 374–376), Kumaracoil. Ugrovatov, A., Bakhtin, A., Volkov, A., Galenko, V., & Muratchaev, S. (2016). Using scenarios for performance analysis of MANET protocols in space operations. In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 374–376), Kumaracoil.
25.
go back to reference Alam Siddiquee, K. N. E., Khan, F. F., Andersson, K., & Hossain, M. S. (2017). Optimal dynamic routing protocols for agro-sensor communication in MANETs. In 2017 14th IEEE annual consumer communications & networking conference (CCNC) (pp. 1–5), Las Vegas, NV. Alam Siddiquee, K. N. E., Khan, F. F., Andersson, K., & Hossain, M. S. (2017). Optimal dynamic routing protocols for agro-sensor communication in MANETs. In 2017 14th IEEE annual consumer communications & networking conference (CCNC) (pp. 1–5), Las Vegas, NV.
26.
go back to reference Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37–48.CrossRef Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37–48.CrossRef
27.
go back to reference Wu, F., Xu, L., Kumari, S., Li, X., Das, A. K., Khan, M. K., et al. (2016). A novel and provablysecure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks, 9, 3527–3542.CrossRef Wu, F., Xu, L., Kumari, S., Li, X., Das, A. K., Khan, M. K., et al. (2016). A novel and provablysecure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks, 9, 3527–3542.CrossRef
28.
go back to reference Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14, 10081–10106.CrossRef Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14, 10081–10106.CrossRef
29.
go back to reference He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263–277.CrossRef He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263–277.CrossRef
30.
go back to reference Shankar, A., & Jaisankar, N. (2016). A novel energy efficient clustering mechanism in wireless sensor network. Procedia Computer Science, 89, 134–141.CrossRef Shankar, A., & Jaisankar, N. (2016). A novel energy efficient clustering mechanism in wireless sensor network. Procedia Computer Science, 89, 134–141.CrossRef
31.
go back to reference Sherifi, I., & Senja, E. (2018). Internet usage on mobile devices and their impact on evolution of informative websites in Albania. European Journal of Business, 3(6), 37–43. Sherifi, I., & Senja, E. (2018). Internet usage on mobile devices and their impact on evolution of informative websites in Albania. European Journal of Business, 3(6), 37–43.
33.
go back to reference Akhtar, R., Shengua, Y., Zhiyu, Z., Khan, Z. A., Memon, I., Ur Rehman, S., et al. (2019). Content distribution and protocol design issue for mobile social networks: a survey. EURASIP Journal on Wireless Communications and Networking, 1, 128.CrossRef Akhtar, R., Shengua, Y., Zhiyu, Z., Khan, Z. A., Memon, I., Ur Rehman, S., et al. (2019). Content distribution and protocol design issue for mobile social networks: a survey. EURASIP Journal on Wireless Communications and Networking, 1, 128.CrossRef
34.
go back to reference Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.CrossRef Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.CrossRef
Metadata
Title
A novel node authentication protocol connected with ECC for heterogeneous network
Authors
Purushottam G. Chilveri
Manoj S. Nagmode
Publication date
26-05-2020
Publisher
Springer US
Published in
Wireless Networks / Issue 7/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02358-4

Other articles of this Issue 7/2020

Wireless Networks 7/2020 Go to the issue