Skip to main content
Erschienen in: Cluster Computing 5/2019

25.10.2017

Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks

verfasst von: Ayush Sogani, Aman Jain

Erschienen in: Cluster Computing | Sonderheft 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks described as an emerging new technology with a very promising future. Advances made in wireless sensor networks (WSNs) are the merging of advanced electronic and wireless technologies. Due to the popularity gained by the wireless environment, Security is the main concern. Node authentication without compromising lifespan of the networks is practically a daunting task. This research work introduces a new model, IBE-ECC that administers the energy of sensor nodes with faster authentication process. Signature verification model is deployed to achieve faster authentication process. Nevertheless, the public key-based strategies eliminate the security process but their verification process takes larger time. Therefore, authentication speed is a major constraint of our research endeavor. The proposed scheme is design to achieve high security and fast authentication with energy efficiency. It uses identity-based encryption on elliptic curve cryptography and a user authentication with an energy efficient key management. Further, to improve the speed of the authentication, it reduces the signature size so that it would accelerate signature verification faster. Hence, the proposed scheme will provide a secure key management, energy efficiency, fast authentication and additionally, computation overhead and communication costs are minimized. Finally, the experimental result demonstrates that the proposed strategy obtains 4797 ms higher execution efficiency and 45. 53% lower computation costs than existing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildi, I.F., Su, W., Sankarasubramaniam, Y., et al.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)CrossRef Akyildi, I.F., Su, W., Sankarasubramaniam, Y., et al.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)CrossRef
2.
Zurück zum Zitat Romer, K., Mattern, F., et al.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11(6), 54–61 (2004)CrossRef Romer, K., Mattern, F., et al.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11(6), 54–61 (2004)CrossRef
3.
Zurück zum Zitat Sivaraman, E.: An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring. Ad Hoc Netw. 11(3), 798–817 (2013)CrossRef Sivaraman, E.: An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring. Ad Hoc Netw. 11(3), 798–817 (2013)CrossRef
4.
Zurück zum Zitat Owojaiye, G., Sun, Y., et al.: Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring. Ad Hoc Netw. 11(3), 1237–1253 (2013)CrossRef Owojaiye, G., Sun, Y., et al.: Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring. Ad Hoc Netw. 11(3), 1237–1253 (2013)CrossRef
5.
Zurück zum Zitat Sun, E.A., et al.: Mise-pipe: magnetic induction-based wireless sensor networks for underground pipeline monitoring. Ad Hoc Netw. 9(3), 218–227 (2011)CrossRef Sun, E.A., et al.: Mise-pipe: magnetic induction-based wireless sensor networks for underground pipeline monitoring. Ad Hoc Netw. 9(3), 218–227 (2011)CrossRef
6.
Zurück zum Zitat Bottero, M., Dalla Chiara, B., Defiorio, F., et al.: Wireless sensor networks for traffic monitoring in a logistics centre. Transp. Res. Part C Emerg. Technol. 26, 99–124 (2013)CrossRef Bottero, M., Dalla Chiara, B., Defiorio, F., et al.: Wireless sensor networks for traffic monitoring in a logistics centre. Transp. Res. Part C Emerg. Technol. 26, 99–124 (2013)CrossRef
7.
Zurück zum Zitat Ramesh, M.: Design, development, and deployment of a wireless sensor network for detection of landslides. Ad Hoc Netw. 13, 2–18 (2012)CrossRef Ramesh, M.: Design, development, and deployment of a wireless sensor network for detection of landslides. Ad Hoc Netw. 13, 2–18 (2012)CrossRef
8.
Zurück zum Zitat Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M., et al.: An efficient broadcast authentication scheme in wireless sensor networks. In Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS’06, pp. 311–320 (2006) Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M., et al.: An efficient broadcast authentication scheme in wireless sensor networks. In Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS’06, pp. 311–320 (2006)
9.
Zurück zum Zitat Lee, J., Kim, S., Cho, Y., Chung, Y., Park, Y., et al.: HORSIC: an efficient one-time signaturescheme for wireless sensor networks. Inf. Process. Lett. 112(20), 783–787 (2012)CrossRef Lee, J., Kim, S., Cho, Y., Chung, Y., Park, Y., et al.: HORSIC: an efficient one-time signaturescheme for wireless sensor networks. Inf. Process. Lett. 112(20), 783–787 (2012)CrossRef
10.
Zurück zum Zitat Turkanovi’c, M., Hlbl, M., et al.: Notes on a temporal-credential-based mutual authentication and key agreement scheme for wireless sensornetworks. Wirel. Pers. Commun. 77(2), 907–922 (2013)CrossRef Turkanovi’c, M., Hlbl, M., et al.: Notes on a temporal-credential-based mutual authentication and key agreement scheme for wireless sensornetworks. Wirel. Pers. Commun. 77(2), 907–922 (2013)CrossRef
11.
Zurück zum Zitat Hongbin, M., Yingli, W., Shuang, Y., et al.: Hybrid keymanagement mechanism based on double cluster head structure, 2nd International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), IEEE, pp. 1164–1167, (2012) Hongbin, M., Yingli, W., Shuang, Y., et al.: Hybrid keymanagement mechanism based on double cluster head structure, 2nd International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), IEEE, pp. 1164–1167, (2012)
12.
Zurück zum Zitat Fan, Y., et al.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Commun. Syts. 36(1), 316–323 (2012) Fan, Y., et al.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Commun. Syts. 36(1), 316–323 (2012)
13.
Zurück zum Zitat Wong, K.H.M., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1, p. 8–17 (2006) Wong, K.H.M., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1, p. 8–17 (2006)
14.
Zurück zum Zitat Das, A.K., et al.: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5), 1646–1656 (2012)CrossRef Das, A.K., et al.: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5), 1646–1656 (2012)CrossRef
15.
Zurück zum Zitat Odelu V, Das A.K., Alghathbar and Khan et al.: A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Secur. Commun. Netw. (2011) Odelu V, Das A.K., Alghathbar and Khan et al.: A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Secur. Commun. Netw. (2011)
16.
Zurück zum Zitat Chen, T., Shih, W.: A robust mutual authentication protocol for wireless sensor networks. Etri J. 32(5), 704–712 (2012)CrossRef Chen, T., Shih, W.: A robust mutual authentication protocol for wireless sensor networks. Etri J. 32(5), 704–712 (2012)CrossRef
17.
Zurück zum Zitat Jiang, Q., J. Ma., Lu, X., Tian, Y. et al.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. (2014) Jiang, Q., J. Ma., Lu, X., Tian, Y. et al.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. (2014)
18.
Zurück zum Zitat Chun, C., Daojing, H., Sammy, C., Jiajun, B., Yi, G., Rong, F.: Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3), 347–62 (2014)CrossRef Chun, C., Daojing, H., Sammy, C., Jiajun, B., Yi, G., Rong, F.: Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3), 347–62 (2014)CrossRef
19.
Zurück zum Zitat Amin, R., Biswas, G.P., et al.: A novel user authentication and key agreement protocol for accessing multi medical server usable in TMIS. J. Med. Syst. 39(3), 33 (2015)CrossRef Amin, R., Biswas, G.P., et al.: A novel user authentication and key agreement protocol for accessing multi medical server usable in TMIS. J. Med. Syst. 39(3), 33 (2015)CrossRef
20.
Zurück zum Zitat Shim, K.-A., Lee, Y.-R., Park, C.-M.: EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)CrossRef Shim, K.-A., Lee, Y.-R., Park, C.-M.: EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)CrossRef
21.
Zurück zum Zitat Benzaid, C., Saiah, A., Badache, N.: An enhanced secure pairwise broadcast time synchronization protocol in wireless sensor networks. In Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed, and Network based Processing, PDP’2014, pp. 569–573 (2014) Benzaid, C., Saiah, A., Badache, N.: An enhanced secure pairwise broadcast time synchronization protocol in wireless sensor networks. In Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed, and Network based Processing, PDP’2014, pp. 569–573 (2014)
22.
Zurück zum Zitat Varatharajan, R., Manogaran, G., Priyan, M.K., Sundarasekar, R.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput. 1, 1–10 (2017) Varatharajan, R., Manogaran, G., Priyan, M.K., Sundarasekar, R.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput. 1, 1–10 (2017)
23.
Zurück zum Zitat Varatharajan, R., Manogaran, G., Priyan, M.K., Balaş, V.E., Barna, C.: Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed. Tools Appl. 1, 1–21 (2017) Varatharajan, R., Manogaran, G., Priyan, M.K., Balaş, V.E., Barna, C.: Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed. Tools Appl. 1, 1–21 (2017)
Metadaten
Titel
Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks
verfasst von
Ayush Sogani
Aman Jain
Publikationsdatum
25.10.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 5/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1151-6

Weitere Artikel der Sonderheft 5/2019

Cluster Computing 5/2019 Zur Ausgabe