Skip to main content
Top
Published in: Wireless Networks 7/2016

01-10-2016

LoWaNA: low overhead watermark based node authentication in WSN

Authors: Arpan Sen, Tanusree Chatterjee, Sipra DasBit

Published in: Wireless Networks | Issue 7/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making them susceptible to attacks. Therefore, the need of defending such attacks is of utmost importance. The challenge in providing security in this network is that the securing mechanism must be lightweight to make it implementable for such resource-constrained nodes. A robust security solution for such networks must facilitate authentication of sensor nodes. So far, only data authentication has drawn much attention from the research community. In this paper, a digital watermark based low-overhead solution (LoWaNA) is proposed for node authentication. The proposed watermarking technique consists of three modules viz. watermark generation, embedding and detection. The robustness of the algorithm is measured in terms of cracking probability and cracking time. This robustness analysis helps us to set the design guideline regarding size of watermark. Performance of the scheme is analyzed in terms of storage, computation and communication overhead. The analytical results are compared with two of the existing schemes and that show significant reduction of all such overheads. Thus it proves the suitability of the proposed scheme for resource-constrained networks like WSN. Finally the entire scheme is simulated in Cooja, the Contiki network simulator to make it readily implementable in real life mote e.g. MICAz.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Newman, R., & Beyah, R. A. (2009). On the performance of using Covert Timing Channels for node authentication. Security and Communication Networks, 2(6), 492–506. Newman, R., & Beyah, R. A. (2009). On the performance of using Covert Timing Channels for node authentication. Security and Communication Networks, 2(6), 492–506.
2.
go back to reference Zhang, W., Liu, Y., Das, S., & De, P. (2008). Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach. Pervasive and Mobile Computing, 4, 658–680.CrossRef Zhang, W., Liu, Y., Das, S., & De, P. (2008). Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach. Pervasive and Mobile Computing, 4, 658–680.CrossRef
3.
go back to reference Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor network: A survey. Computer Networks, 38, 393–422.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor network: A survey. Computer Networks, 38, 393–422.CrossRef
4.
go back to reference Xiao, R., Sun, X., & Yang, Y. (2008). Copyright protection in wireless sensor networks by watermarking. In: International conference on intelligent information hiding and multimedia signal processing (IIH-MSP), pp. 7–10. Xiao, R., Sun, X., & Yang, Y. (2008). Copyright protection in wireless sensor networks by watermarking. In: International conference on intelligent information hiding and multimedia signal processing (IIH-MSP), pp. 7–10.
5.
go back to reference Dong, X., & Li, X. (2009). An authentication method for self nodes based on watermarking in wireless sensor networks. In: International conference on wireless communication (WiCOM), pp. 4529–4532. Dong, X., & Li, X. (2009). An authentication method for self nodes based on watermarking in wireless sensor networks. In: International conference on wireless communication (WiCOM), pp. 4529–4532.
6.
go back to reference Gupta, S., Verma, H. K., & Sangal, A. L. (2010). Authentication protocol for wireless sensor networks. International Journal of World Academy of Science, Engineering and Technology (WASET), Paris, 42, 630–636. Gupta, S., Verma, H. K., & Sangal, A. L. (2010). Authentication protocol for wireless sensor networks. International Journal of World Academy of Science, Engineering and Technology (WASET), Paris, 42, 630–636.
7.
go back to reference Zhang, J., Shankaran, R., Orgun, M. A., Sattar, A., & Varadharajan, V. (2012). A Dynamic authentication scheme for hierarchical wireless sensor networks. Mobile and Ubiquitous Systems: Computing, Networking, and Services, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 73, pp. 186–197. Zhang, J., Shankaran, R., Orgun, M. A., Sattar, A., & Varadharajan, V. (2012). A Dynamic authentication scheme for hierarchical wireless sensor networks. Mobile and Ubiquitous Systems: Computing, Networking, and Services, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 73, pp. 186–197.
8.
go back to reference Zhang, Q., Zhou, X., & Yang, F. (2009). Distributed node authentication in wireless sensor networks. In: 5th International conference on wireless communications, networking and mobile computing (WiCOM), pp. 3361–3364. Zhang, Q., Zhou, X., & Yang, F. (2009). Distributed node authentication in wireless sensor networks. In: 5th International conference on wireless communications, networking and mobile computing (WiCOM), pp. 3361–3364.
9.
go back to reference Kugler, P., Nordhus, P., & Eskofier, B. (2013). Shimmer, Cooja and Contiki: A new toolset for the simulation of on-node signal processing algorithms. In: International conference on body sensor networks, pp. 1–6. Kugler, P., Nordhus, P., & Eskofier, B. (2013). Shimmer, Cooja and Contiki: A new toolset for the simulation of on-node signal processing algorithms. In: International conference on body sensor networks, pp. 1–6.
10.
go back to reference Menezes, A., van Oorschot, P., & Vanstone, S. (1996). Handbook of Applied Cryptography, CRC Press. Menezes, A., van Oorschot, P., & Vanstone, S. (1996). Handbook of Applied Cryptography, CRC Press.
11.
go back to reference Pathan, A. S. K., Lee, H.-W., & Hong, C. S.(2006). Security in wireless sensor networks: Issues and challenges. In: International conference on advanced computing technologies, pp. 1043–1045. Pathan, A. S. K., Lee, H.-W., & Hong, C. S.(2006). Security in wireless sensor networks: Issues and challenges. In: International conference on advanced computing technologies, pp. 1043–1045.
12.
go back to reference Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and counter measures. Elsevier’s AdHoc Networks Journal, 1(2–3), 293–315 (special issue on Sensor Network Applications and Protocols).CrossRef Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and counter measures. Elsevier’s AdHoc Networks Journal, 1(2–3), 293–315 (special issue on Sensor Network Applications and Protocols).CrossRef
16.
go back to reference de Meulenaer, G., Gosset, F., Standaert, F.-X., & Pereira, O.(2008). On the energy cost of communication and cryptography in wireless sensor networks. In: Networking and communications. International conference on wireless and mobile computing (wimob), pp. 580–585. de Meulenaer, G., Gosset, F., Standaert, F.-X., & Pereira, O.(2008). On the energy cost of communication and cryptography in wireless sensor networks. In: Networking and communications. International conference on wireless and mobile computing (wimob), pp. 580–585.
17.
go back to reference Chowdhury, A. R., Chatterjee, T., & DasBit, S. (2014). LOCHA: A light-weight one-way cryptographic hash algorithm for wireless sensor network. In: 5th International conference on ambient systems, networks and technologies (ANT), procedia computer science, Vol. 32, pp. 497–504. Chowdhury, A. R., Chatterjee, T., & DasBit, S. (2014). LOCHA: A light-weight one-way cryptographic hash algorithm for wireless sensor network. In: 5th International conference on ambient systems, networks and technologies (ANT), procedia computer science, Vol. 32, pp. 497–504.
18.
go back to reference Yussoff, Y. M., Hashim, H., & Baba, M. D. (2012). Identity-based trusted authentication in wireless sensor network. International Journal of Computer Science Issues (IJCSI), 9(3), 230–239. Yussoff, Y. M., Hashim, H., & Baba, M. D. (2012). Identity-based trusted authentication in wireless sensor network. International Journal of Computer Science Issues (IJCSI), 9(3), 230–239.
20.
go back to reference Dunkels, A., Osterlind, F., & He, Z. (2007). An adaptive communication architecture for wireless sensor networks. In: International conference on embedded networked sensor systems (SenSys), ACM digital library, pp. 335–349. Dunkels, A., Osterlind, F., & He, Z. (2007). An adaptive communication architecture for wireless sensor networks. In: International conference on embedded networked sensor systems (SenSys), ACM digital library, pp. 335–349.
21.
go back to reference Kuhn, F., Wattenhofer, R., & Zollinger, A. (2003). Ad hoc networks beyond unit disk graphs. In Proceedings of the 2003 joint workshop on foundations of mobile computing (DIALM-POMC ’03), pp. 69–78. Kuhn, F., Wattenhofer, R., & Zollinger, A. (2003). Ad hoc networks beyond unit disk graphs. In Proceedings of the 2003 joint workshop on foundations of mobile computing (DIALM-POMC ’03), pp. 69–78.
Metadata
Title
LoWaNA: low overhead watermark based node authentication in WSN
Authors
Arpan Sen
Tanusree Chatterjee
Sipra DasBit
Publication date
01-10-2016
Publisher
Springer US
Published in
Wireless Networks / Issue 7/2016
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1157-z

Other articles of this Issue 7/2016

Wireless Networks 7/2016 Go to the issue