Skip to main content
Erschienen in: Wireless Personal Communications 1/2015

01.03.2015

A Secure and Efficient Authentication Protocol in Wireless Sensor Network

verfasst von: Kakali Chatterjee, Asok De, Daya Gupta

Erschienen in: Wireless Personal Communications | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With increasing popularity of wireless sensor networks (WSN), the security issues related to such networks have become crucial. Most of the networks use shared key among all the nodes to make communicational overhead minimal. But it is vulnerable to many attacks like replay attack, node-compromise attack, impersonation attack etc. Further many traditional security mechanisms cannot be suitably implemented in WSN as resources are constrained in terms of power, energy and speed. In this paper, we propose a mutual authentication protocol based on timestamp in WSN which generates a new session key for each session. The proposed authentication approach requires light computational and communicational load and resist the major vulnerable attacks in WSN.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Eschenauer, L. & Gligor. V. (2002). A key management scheme for distributed sensor networks. In CCS ’02: Proceedings of the 9th ACM conference on computer and communications security, New York, USA. Eschenauer, L. & Gligor. V. (2002). A key management scheme for distributed sensor networks. In CCS ’02: Proceedings of the 9th ACM conference on computer and communications security, New York, USA.
2.
Zurück zum Zitat Chan, H. Perrig, A. & Song, D. (2003). Random key pre-distribution schemes for sensor networks. In Proceedings of the IEEE security and privacy symposium. Chan, H. Perrig, A. & Song, D. (2003). Random key pre-distribution schemes for sensor networks. In Proceedings of the IEEE security and privacy symposium.
3.
Zurück zum Zitat Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C. & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. In SASN ’04, New York, USA (pp. 59–64). Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C. & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. In SASN ’04, New York, USA (pp. 59–64).
4.
Zurück zum Zitat Uhsadel, L., Poschmann, A. & Paar, C. (2007). An efficient general purpose elliptic curve cryptography module for ubiquitous sensor networks. In SPEED, www.crypto.rub.de Uhsadel, L., Poschmann, A. & Paar, C. (2007). An efficient general purpose elliptic curve cryptography module for ubiquitous sensor networks. In SPEED, www.​crypto.​rub.​de
5.
Zurück zum Zitat Raazi, S. M. K., & Lee, S. (2010). A survey on key management strategies for different application of wireless sensor networks. Journal of Computing Science and Engineering, 4(1), 23–51.CrossRef Raazi, S. M. K., & Lee, S. (2010). A survey on key management strategies for different application of wireless sensor networks. Journal of Computing Science and Engineering, 4(1), 23–51.CrossRef
6.
Zurück zum Zitat Tsai, S. C., Tzeng, W. G., & Zhou, K. Y. (2009). Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1218–1222. Tsai, S. C., Tzeng, W. G., & Zhou, K. Y. (2009). Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1218–1222.
7.
Zurück zum Zitat Yu, Z., & Guan, Y. (2008). A key management scheme using deployment knowledge for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 19(10), 1411–1425.CrossRef Yu, Z., & Guan, Y. (2008). A key management scheme using deployment knowledge for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 19(10), 1411–1425.CrossRef
8.
Zurück zum Zitat Liu, D., Ning, P., & Du, W. (2008). Group-based key predistribution for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(2), 11:1–11:30.CrossRef Liu, D., Ning, P., & Du, W. (2008). Group-based key predistribution for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(2), 11:1–11:30.CrossRef
9.
Zurück zum Zitat Martin, K. M., Paterson, M. B., & Stinson, D. R. (2010). Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Transactions on Sensor Networks (TOSN), 7(2): Article 11. Martin, K. M., Paterson, M. B., & Stinson, D. R. (2010). Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Transactions on Sensor Networks (TOSN), 7(2): Article 11.
10.
Zurück zum Zitat Chen, C.-Y., & Chao, H.-C. (2011). A survey of key distribution in wireless sensor networks. Security Communication Networks. doi:10.1002/sec.354. Chen, C.-Y., & Chao, H.-C. (2011). A survey of key distribution in wireless sensor networks. Security Communication Networks. doi:10.​1002/​sec.​354.
11.
Zurück zum Zitat Benenson, Z., Gedicke, N. & Raivio O. (2005). Realizing robust user authentication in sensor networks. In Workshop on real-world wireless sensor network REALWSN’05. Benenson, Z., Gedicke, N. & Raivio O. (2005). Realizing robust user authentication in sensor networks. In Workshop on real-world wireless sensor network REALWSN’05.
12.
Zurück zum Zitat Wong, K. H. M., Zheng, Y., Cao J. & Wang S. (2006). A dynamic user authentication scheme for wireless sensor networks. In IEEE SUTC’06 (pp. 244–251). Wong, K. H. M., Zheng, Y., Cao J. & Wang S. (2006). A dynamic user authentication scheme for wireless sensor networks. In IEEE SUTC’06 (pp. 244–251).
13.
Zurück zum Zitat Tseng, H. R., Jan, R. H. & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor networks. In IEEE GLOBECOM 2007 (pp. 986–990). Tseng, H. R., Jan, R. H. & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor networks. In IEEE GLOBECOM 2007 (pp. 986–990).
14.
Zurück zum Zitat Ko, L.-C. (2008). A novel dynamic user authentication scheme for wireless sensor networks. In IEEE ISWCS 2008 (pp. 608–612). Ko, L.-C. (2008). A novel dynamic user authentication scheme for wireless sensor networks. In IEEE ISWCS 2008 (pp. 608–612).
15.
Zurück zum Zitat Lee, T. H. (2008). Simple dynamic user authentication protocols for wireless sensor networks. In International conference on sensor technologies and application (SENSORCOMM 2008) (pp. 657–660). Lee, T. H. (2008). Simple dynamic user authentication protocols for wireless sensor networks. In International conference on sensor technologies and application (SENSORCOMM 2008) (pp. 657–660).
16.
Zurück zum Zitat Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transaction on Wireless Communication, 8(3), 1086–1090.CrossRef Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transaction on Wireless Communication, 8(3), 1086–1090.CrossRef
18.
Zurück zum Zitat Kumar, P., Sain, M. & Lee, H. J. (2011). An efficient two-factor user authentication framework for wireless sensor networks. In ICACT 2011 (pp. 574–578). Kumar, P., Sain, M. & Lee, H. J. (2011). An efficient two-factor user authentication framework for wireless sensor networks. In ICACT 2011 (pp. 574–578).
19.
Zurück zum Zitat Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H. & Wei, H. W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779. doi:10.3390/s110504767. Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H. & Wei, H. W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779. doi:10.​3390/​s110504767.
20.
Zurück zum Zitat Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. Springer publication, ISBN 0-387-95273-X. Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. Springer publication, ISBN 0-387-95273-X.
21.
Zurück zum Zitat Oh, B.-K., Ha, K.-C., & Oh, J. (2006). An improved baby-step-giant-step method for certain elliptic curves. Journal of Applied Mathematics and Computing, 20(1–2), 485–489. Oh, B.-K., Ha, K.-C., & Oh, J. (2006). An improved baby-step-giant-step method for certain elliptic curves. Journal of Applied Mathematics and Computing, 20(1–2), 485–489.
22.
Zurück zum Zitat Blake, I. F., Seroussi, G., Smart, N. P. (2004). Advances in elliptic curve cryptography. London mathematical society lecture note series. Cambridge University Press, ISBN: 052160415X. Blake, I. F., Seroussi, G., Smart, N. P. (2004). Advances in elliptic curve cryptography. London mathematical society lecture note series. Cambridge University Press, ISBN: 052160415X.
23.
Zurück zum Zitat Karakoyunlu, D., Gurkaynak, F. K., Sunar, B., & Leblebici, Y. (2009). Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields. IET Security, 4(1), 30–43.CrossRef Karakoyunlu, D., Gurkaynak, F. K., Sunar, B., & Leblebici, Y. (2009). Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields. IET Security, 4(1), 30–43.CrossRef
24.
Zurück zum Zitat Cohen, H., & Frey, G. (2006). Handbook of elliptic and hyperelliptic curve cryptography. London: Chapman & Hall/CRC Press.MATH Cohen, H., & Frey, G. (2006). Handbook of elliptic and hyperelliptic curve cryptography. London: Chapman & Hall/CRC Press.MATH
25.
Zurück zum Zitat Longa, P., & Gebotys, C. (2010). Efficient techniques for high speed elliptic curve cryptography. In CHES 2010. LNCS 6225 (pp. 80–94). Longa, P., & Gebotys, C. (2010). Efficient techniques for high speed elliptic curve cryptography. In CHES 2010. LNCS 6225 (pp. 80–94).
26.
Zurück zum Zitat Longa, P., & Gebotys, C. (2009). Novel precomputation schemes for elliptic curve cryptosystems. In ACNS2009 LNCS (Vol. 5536, pp. 71–88). Longa, P., & Gebotys, C. (2009). Novel precomputation schemes for elliptic curve cryptosystems. In ACNS2009 LNCS (Vol. 5536, pp. 71–88).
27.
Zurück zum Zitat Longa, P., & Miri, A. (2008). Fast and flexible elliptic curve point arithmetic over prime fields. IEEE Transactions on Computers, 57(3), 289–302.CrossRefMathSciNet Longa, P., & Miri, A. (2008). Fast and flexible elliptic curve point arithmetic over prime fields. IEEE Transactions on Computers, 57(3), 289–302.CrossRefMathSciNet
28.
Zurück zum Zitat Abi-char, P. E., Mhamed, A., & El Hassan, B. (2007). A secure authenticated key agreement protocol based on elliptic curve cryptography. In International symposium on information assurance and security, IEEE (Vol. 57, pp. 89–94). Abi-char, P. E., Mhamed, A., & El Hassan, B. (2007). A secure authenticated key agreement protocol based on elliptic curve cryptography. In International symposium on information assurance and security, IEEE (Vol. 57, pp. 89–94).
29.
Zurück zum Zitat Bringer, J., Hervé, C., & Thomas I. (2010). Password based key exchange protocols on elliptic curves which conceal the public parameters. In ACNS 2010, lecture notes in computer science( Vol. 6123/2010, pp. 291–308). Bringer, J., Hervé, C., & Thomas I. (2010). Password based key exchange protocols on elliptic curves which conceal the public parameters. In ACNS 2010, lecture notes in computer science( Vol. 6123/2010, pp. 291–308).
30.
Zurück zum Zitat Chatterjee, K., & Gupta, D. (2009). Secure access of smart cards using elliptic curve cryptosystems. In WiCOM 2009, IEEE Catalog No. CFP09WNM-CDR. Chatterjee, K., & Gupta, D. (2009). Secure access of smart cards using elliptic curve cryptosystems. In WiCOM 2009, IEEE Catalog No. CFP09WNM-CDR.
31.
Zurück zum Zitat Chatterjee, K., De, A., & Gupta, D. (2011). Timestamp based authentication protocol for smart card using ECC. In Proceedings of international conference on web information system and mining (WISM 2011), LNCS 2008 (Vol. 6987, pp. 368–375). Chatterjee, K., De, A., & Gupta, D. (2011). Timestamp based authentication protocol for smart card using ECC. In Proceedings of international conference on web information system and mining (WISM 2011), LNCS 2008 (Vol. 6987, pp. 368–375).
32.
Zurück zum Zitat Lim, M.-H., Yeoh, C.-M., Lee, S., Lim, H. & Lee, H. (2008) A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves. In Networking, LNCS 2008 (Vol. 4982/2008, pp. 170–182). Lim, M.-H., Yeoh, C.-M., Lee, S., Lim, H. & Lee, H. (2008) A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves. In Networking, LNCS 2008 (Vol. 4982/2008, pp. 170–182).
33.
Zurück zum Zitat Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M. & Jones, K. On providing anonymity in wireless sensor networks. In Proceedings of the tenth international conference on parallel and distributed systems (ICPADS’04) (pp. 411–418). Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M. & Jones, K. On providing anonymity in wireless sensor networks. In Proceedings of the tenth international conference on parallel and distributed systems (ICPADS’04) (pp. 411–418).
34.
Zurück zum Zitat Wan, C.-Y., Eisenman, S. & Campbell, A. (2003). CODA: Congestion detection and avoidance in sensor networks. In Proceedings of the ACM sensor systems conference, Los Angeles, CA (pp. 266–279). Wan, C.-Y., Eisenman, S. & Campbell, A. (2003). CODA: Congestion detection and avoidance in sensor networks. In Proceedings of the ACM sensor systems conference, Los Angeles, CA (pp. 266–279).
Metadaten
Titel
A Secure and Efficient Authentication Protocol in Wireless Sensor Network
verfasst von
Kakali Chatterjee
Asok De
Daya Gupta
Publikationsdatum
01.03.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-2115-2

Weitere Artikel der Ausgabe 1/2015

Wireless Personal Communications 1/2015 Zur Ausgabe

Neuer Inhalt