Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Secure Authentication Framework in Wireless Sensor Networks

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 15
Year of Publication: 2012
Authors:
Rumana Akhtar
Abdullah Al-mahmud
10.5120/7851-1100

Rumana Akhtar and Abdullah Al-mahmud. Article: Secure Authentication Framework in Wireless Sensor Networks. International Journal of Computer Applications 50(15):38-44, July 2012. Full text available. BibTeX

@article{key:article,
	author = {Rumana Akhtar and Abdullah Al-mahmud},
	title = {Article: Secure Authentication Framework in Wireless Sensor Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {15},
	pages = {38-44},
	month = {July},
	note = {Full text available}
}

Abstract

The nodes in the wireless sensor networks collect data from their environment. Sometimes these data are valuable for the networks and also confidential. So it is important to prevent unauthorized access of those data. The preventive measure can be done through the authentication. In this paper, we propose an authentication framework that authenticates both the users of the network and sensor nodes based on the Identity-Based Signature (IBS) scheme. IBS uses the ECC (Elliptic Curve Cryptography) based digital signature algorithm (DSA) to sign a message and verify the signature on a message for a wireless sensor networks. This authentication framework register a new user and sensor node, authenticate a user and sensor node, and finally establishes a session key between sensor nodes and between sensor node and the user depends on the authenticating parties. Node and user revocation is handled in this authentication framework. Finally we made a comparison with other existing security solutions in wireless sensor networks and able to make a conclusion that the protocol provides confidentiality and integrity of the data; and also achieves better computational, communicational performance and energy efficiency due to the use of more efficient IBS algorithms based on ECC than those based on RSA.

References

  • Rehana Yasmin, Eike Ritter, and Guilin Wang (July 2010), An Authentication Framework forWireless Sensor Networks using Identity-Based Signatures, 10th International Conference on Computer and Information Technology (CIT).
  • Hui Song, Liang Xie, Sencun Zhu and Guohong Cao (2007), "Sensor Node Compromise Detection: The Location Perspective" IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing.
  • D. Liu and P. Ning (2004), Multilevel mTESLA: Broadcast authentication for distributed sensor networks, ACM Trans. Embed. Comput. Syst. 3(4), pp 800–836.
  • Hu Jin, He Debiao and Chen Jianhua (2010), An Identity Based Digital Signature from ECDSA, Second International Workshop on Education Technology and Computer Science (ETCS), pp 627 - 630.
  • N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz (2004), Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, CHES, pp 119–132.
  • M. Choudary Gorantla, Colin Boyd, and Juan Manuel Gonz_alez Nieto (2008), ID- based One-pass Authenticated Key Establishment, AISC.
  • Wei Ren, Kui Ren, Wenjing Lou and Yanchao Zhang (2008), Efficient User Revocation for Privacy-aware PKI, 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness.
  • M. Durvy, C. Fragouli and P. Thiran (2007),"Towards Reliable Broadcasting using ACKs", Information Theory, 2007. ISIT 2007. IEEE International Symposium, page 1156 – 1160
  • Nikolaos A. Pantazis, Dimitrios J. Vergados, Dimitrios D. Vergados and Christos Douligeris (March 2009), Energy efficiency in wireless sensor networks using sleep mode TDMA scheduling, Elsevier Science Publishers B. V.
  • H. -R. Tseng, R. H. Jan and W. Yang (2007), An improved dynamic user authentication scheme for wireless sensor networks, Global Telecommunications Conference, pp 986 - 990
  • M. Halil-Hani, V. P. Nambiar, M. N. Marsono (2010), Hardware acceleration of OpenSSL cryptography functions for high-performance internet security, International IEEE conference on intelligent systems, modelling and simulation (ISMS), pp 374-379.
  • Z. Benenson, F. Gartner and D. Kesdogan (2004), User authentication in sensor networks
  • S. BaneIjee and D. Mukhopadhyay (2006), Symmetric key based authentication querying in wireless sensor networks, First international conference on Integrated internet ad hoc and sensor networks.
  • C. Jiang, B. Li and H. Xu (2007), An efficient scheme for user authentication in wireless sensor networks, 21st International Conference on Advanced Information Networking and Applications Workshops, pp 438 - 442.