CFP last date
20 May 2025
Reseach Article

An Authenticated Key Agreement Scheme for Securing In-Network Communication for Constrained Network Devices

by Aline Zebaze Tsague, Elie Tagne Fute
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 3
Year of Publication: 2025
Authors: Aline Zebaze Tsague, Elie Tagne Fute
10.5120/ijca2025924814

Aline Zebaze Tsague, Elie Tagne Fute . An Authenticated Key Agreement Scheme for Securing In-Network Communication for Constrained Network Devices. International Journal of Computer Applications. 187, 3 ( May 2025), 9-16. DOI=10.5120/ijca2025924814

@article{ 10.5120/ijca2025924814,
author = { Aline Zebaze Tsague, Elie Tagne Fute },
title = { An Authenticated Key Agreement Scheme for Securing In-Network Communication for Constrained Network Devices },
journal = { International Journal of Computer Applications },
issue_date = { May 2025 },
volume = { 187 },
number = { 3 },
month = { May },
year = { 2025 },
issn = { 0975-8887 },
pages = { 9-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number3/an-authenticated-key-agreement-scheme-for-securing-in-network-communication-for-constrained-network-devices/ },
doi = { 10.5120/ijca2025924814 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-05-17T02:45:46+05:30
%A Aline Zebaze Tsague
%A Elie Tagne Fute
%T An Authenticated Key Agreement Scheme for Securing In-Network Communication for Constrained Network Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 3
%P 9-16
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paperproposes using an ephemeral key-based encryption scheme derived from the Elliptic Curve Diffie-Hellman (ECDH) key exchange scheme to establish a secure communication link between constrained nodes of a hierarchical sensor network. Wireless sensor networks (WSN) consist of a collection of autonomous sensor nodes, interconnected via wireless links and deployed on a geographically limited environment. Regardless of the application for which a WSN can be deployed, security remains one of its main current challenges. The proposed approach is here applied not only to privacy and mutual authentication between the sensors and the base station, but also to the minimization of computational and communication overhead by employing the EC point multiplication from ECC while providing a strong security especially forward secrecy. Security analysis of the proposed scheme shows that it relies on use of short-term key-based encryption and also the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP) and provides a good number of security properties. With the performance analysis performed, it’s shown that the proposed scheme presents the merits of being purely autonomous and lightweight in terms of computational cost and number of communication passes necessary to run its operations.

References
  1. G. Abdul-Salaam, A. H. Abdullah, M. H. Anisi, A. Gani, A. Alelaiwi, (2016). A comparative analysis of energy conservation approaches in hybrid wireless sensor networks data collection protocols. In Telecommunication Systems, Springer US, 61(1):159–179
  2. S. Aruna, L. M. Varalakshmi, (2013). Data Gathering Using Sink Mobility with Three Tier Security Scheme in Wireless Sensor Network. International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, 2(12)
  3. P. Kasyoka, M. Kimwele, S. M. Angolo, (2020). Multi-user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography. Engineering Reports. John Wiley & Sons, Ltd. https://doi.org/10.1002/eng2.12176
  4. S. Jebri, M. Abid, A. Bouallegue, (2018). LTAMA-algorithm: light and trust anonymous mutual authentication algorithm for IoT. In Proceedings of the IEEE 87th Vehicular Technology Conference (VTC Spring).
  5. M. Krol, (2016). Routing in Wireless Sensor Networks. PhD thesis, University of Grenoble, Grenoble, France
  6. L. Tong, Z. Yuhui, Z. Ti, (2017). Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks. Security and Communication Networks, https://doi.org/10.1155/2017/4167549.
  7. C. Chen-Yang, L. Iuon-Chang, H. Shu-Yan, (2015). An RSA-like scheme for multiuser broadcast authentication in wireless sensor networks. International Journal of Distributed Sensor Networks. 11(9):743623.
  8. B. Muhammad, K. Shin-Gak, (2017). A Secure Key Agreement Protocol for Dynamic Group, Cluster Computing. The Journal of Networks, Software Tools and Applications” ISSN: 1386-7857 (Print) 1573-7543 (Online)
  9. H. Zhong, R. Zhao, J. Cui, X. Jiang, J. Gao, (2016). An improved ECDSA scheme for wireless sensor networks. International Journal of Future Generation Communication and Networking. 9(2):73-82. http://dx.doi.org/10.14257/ijfgcn.2016.9.2.08
  10. D. Manali, D. Aaradhana, (2013). Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture. International Journal of Computer Applications (0975 – 8887), 69 (24)
  11. J. Preetika, V. Manju, R.V. Pushpendra, (2015). Secure Authentication Approach Using Diffie-Hellman Key Exchange Algorithm for WSN. In 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), pages 527-532
  12. M. Portnoi, C.C. Shen, (2016). Location-Enhanced Authenticated Key Exchange. 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, Hawaii, USA
  13. S. Seung-Hyun, W. Jongho, S. Salmin, B. Elisa, (2015). Effective Key Management in Dynamic Wireless Sensor Networks. IEEE Transactions on Information Forensics and Security, 10(2)
  14. C. Wang, G. Xu, J. Sun, (2017). An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks. Sensors 17, 2946; https://doi.org/10.3390/s17122946
  15. Certicom Research (2010). Standards for Efficient Cryptography 2 (SEC 2): Recommended Elliptic Curve Domain Parameters, Version 2.0.
  16. M. Vandana, B. Ravindara, S. Yashwant, (2019). Reauthentication scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 23(2019): 158–166
  17. B. Kim, J. Song, (2017). An Efficient and Practical Mobile Node Reauthentication Scheme for Mobile Wireless Sensor Networks. Proceedings of the 3rd International Conference on Communication and Information Processing, pages 326–331
  18. Z. Quan1, T. Chunming, Z. Xianghan, R. Chunming, (2015). A secure user authentication protocol for sensor network in data capturing. Journal of Cloud Computing: Advances, Systems and Applications, 4:(6). DOI 10.1186/s13677-015-0030-z
  19. Z. Asim, I. A. K. M. Muzahidul, Z. Mahdi, A. M. Ishtiak, M. Nafees, B. Sabariah, K. Yoshiaki, K. Shozo, (2016). Clustering Analysis in Wireless Sensor Networks: The Ambit of Performance Metrics and Schemes Taxonomy. https://doi.org/10.1177%2F155014774979142
  20. Y. Chen, L. López, J.-F. Martínez, P. Castillejo, (2018). A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth. Journal of Sensors, 2018:(7574238), pages 1-16. https://doi.org/10.1155/2018/7574238
  21. M. F. Fernandez, P. Caballero-Gil, C. Caballero-Gil, (2016). Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things. MDPI Journal Sensors, doi:10.3390/s16010075
  22. Q. Wang, W. Chen, L. Wang, (2019). A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using Block Cipher Algorithm Based on IoT. International Journal of Wireless Information Networks, https://doi.org/10.1007/s10776-019-00471-6
  23. M. Luo, Y. Luo, Y. Wan, Z. Wang, (2018). Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT, Hindawi Security and Communication Networks, https://doi.org/10.1155/2018/6140978
  24. A. Ghani, K. Mansoor, S. Mehmood, S. A. Chaudhry, A. U. Rahman, M. N. Saqib, (2019). Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key, Int J Commun Syst. https://doi.org/10.1002/dac.4139
  25. B. Kim, J. Song, (2019). Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks. Journal on Wireless Communications and Networking, 155 https://doi.org/10.1186/s13638-019-1470-9
  26. V. Mohindru, R. Bhatt, Y. Singh, (2019). Reauthentication scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 23: 158-166. https://doi.org/10.1016/j.suscom.2019.07.010
  27. M. Bilal, S.-G. Kang, (2017). An authentication protocol for future sensor networks. Journal of Sensors, 17:(979), pages 1–29.
  28. P. Porambage, A. Braeken, C. Schmitt, A. Gurtov, M. Ylianttila1, B. Stiller, (2015). Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications. IEEE Access: The journal of rapid open access publishing. 3:(2015). DOI 10.1109/ACCESS.2015.2474705
  29. A. P. Renold, B. G. Athi, (2019). Energy efficient secure data collection with path-constrained mobile sink in duty-cycled unattended wireless sensor network. Pervasive and Mobile Computing, 55 :1–12. https ://doi.org/10.1016/J.PMCJ.2019.02.002.
  30. M. El-hajj, A. Fadlallah, M. Chamoun, A. Serhrouchni, (2019). A Survey of Internet of Things (IoT) Authentication Schemes. Sensors 19:1141; doi:10.3390/s19051141
Index Terms

Computer Science
Information Sciences
Authentication
Constrained Networks
Key Agreement
Security

Keywords

Authentication Ephemeral keys Forward secrecy In-network Communication Security Signature Wireless Sensor Network