CFP last date
22 April 2024
Reseach Article

Secure Authentication Framework in Wireless Sensor Networks

by Rumana Akhtar, Abdullah Al-mahmud
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 15
Year of Publication: 2012
Authors: Rumana Akhtar, Abdullah Al-mahmud
10.5120/7851-1100

Rumana Akhtar, Abdullah Al-mahmud . Secure Authentication Framework in Wireless Sensor Networks. International Journal of Computer Applications. 50, 15 ( July 2012), 38-44. DOI=10.5120/7851-1100

@article{ 10.5120/7851-1100,
author = { Rumana Akhtar, Abdullah Al-mahmud },
title = { Secure Authentication Framework in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 15 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 38-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number15/7851-1100/ },
doi = { 10.5120/7851-1100 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:48:25.016499+05:30
%A Rumana Akhtar
%A Abdullah Al-mahmud
%T Secure Authentication Framework in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 15
%P 38-44
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The nodes in the wireless sensor networks collect data from their environment. Sometimes these data are valuable for the networks and also confidential. So it is important to prevent unauthorized access of those data. The preventive measure can be done through the authentication. In this paper, we propose an authentication framework that authenticates both the users of the network and sensor nodes based on the Identity-Based Signature (IBS) scheme. IBS uses the ECC (Elliptic Curve Cryptography) based digital signature algorithm (DSA) to sign a message and verify the signature on a message for a wireless sensor networks. This authentication framework register a new user and sensor node, authenticate a user and sensor node, and finally establishes a session key between sensor nodes and between sensor node and the user depends on the authenticating parties. Node and user revocation is handled in this authentication framework. Finally we made a comparison with other existing security solutions in wireless sensor networks and able to make a conclusion that the protocol provides confidentiality and integrity of the data; and also achieves better computational, communicational performance and energy efficiency due to the use of more efficient IBS algorithms based on ECC than those based on RSA.

References
  1. Rehana Yasmin, Eike Ritter, and Guilin Wang (July 2010), An Authentication Framework forWireless Sensor Networks using Identity-Based Signatures, 10th International Conference on Computer and Information Technology (CIT).
  2. Hui Song, Liang Xie, Sencun Zhu and Guohong Cao (2007), "Sensor Node Compromise Detection: The Location Perspective" IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing.
  3. D. Liu and P. Ning (2004), Multilevel mTESLA: Broadcast authentication for distributed sensor networks, ACM Trans. Embed. Comput. Syst. 3(4), pp 800–836.
  4. Hu Jin, He Debiao and Chen Jianhua (2010), An Identity Based Digital Signature from ECDSA, Second International Workshop on Education Technology and Computer Science (ETCS), pp 627 - 630.
  5. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz (2004), Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, CHES, pp 119–132.
  6. M. Choudary Gorantla, Colin Boyd, and Juan Manuel Gonz_alez Nieto (2008), ID- based One-pass Authenticated Key Establishment, AISC.
  7. Wei Ren, Kui Ren, Wenjing Lou and Yanchao Zhang (2008), Efficient User Revocation for Privacy-aware PKI, 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness.
  8. M. Durvy, C. Fragouli and P. Thiran (2007),"Towards Reliable Broadcasting using ACKs", Information Theory, 2007. ISIT 2007. IEEE International Symposium, page 1156 – 1160
  9. Nikolaos A. Pantazis, Dimitrios J. Vergados, Dimitrios D. Vergados and Christos Douligeris (March 2009), Energy efficiency in wireless sensor networks using sleep mode TDMA scheduling, Elsevier Science Publishers B. V.
  10. H. -R. Tseng, R. H. Jan and W. Yang (2007), An improved dynamic user authentication scheme for wireless sensor networks, Global Telecommunications Conference, pp 986 - 990
  11. M. Halil-Hani, V. P. Nambiar, M. N. Marsono (2010), Hardware acceleration of OpenSSL cryptography functions for high-performance internet security, International IEEE conference on intelligent systems, modelling and simulation (ISMS), pp 374-379.
  12. Z. Benenson, F. Gartner and D. Kesdogan (2004), User authentication in sensor networks
  13. S. BaneIjee and D. Mukhopadhyay (2006), Symmetric key based authentication querying in wireless sensor networks, First international conference on Integrated internet ad hoc and sensor networks.
  14. C. Jiang, B. Li and H. Xu (2007), An efficient scheme for user authentication in wireless sensor networks, 21st International Conference on Advanced Information Networking and Applications Workshops, pp 438 - 442.
Index Terms

Computer Science
Information Sciences

Keywords

WSN Security ECC Authentication IBS