CFP last date
20 May 2024
Reseach Article

Authentication and Integrity of Data in Wireless Sensor Network with Mobile Sink

by P. M. Kakade, V. V. Kimbahune
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 8
Year of Publication: 2013
Authors: P. M. Kakade, V. V. Kimbahune
10.5120/14472-2766

P. M. Kakade, V. V. Kimbahune . Authentication and Integrity of Data in Wireless Sensor Network with Mobile Sink. International Journal of Computer Applications. 83, 8 ( December 2013), 37-41. DOI=10.5120/14472-2766

@article{ 10.5120/14472-2766,
author = { P. M. Kakade, V. V. Kimbahune },
title = { Authentication and Integrity of Data in Wireless Sensor Network with Mobile Sink },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 8 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number8/14472-2766/ },
doi = { 10.5120/14472-2766 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:51.444549+05:30
%A P. M. Kakade
%A V. V. Kimbahune
%T Authentication and Integrity of Data in Wireless Sensor Network with Mobile Sink
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 8
%P 37-41
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Wireless Sensor Network (WSN) is one of the core technologies to form the future networks. As WSN consisting of several sink nodes and sensor nodes, while it have many advantages, such as the compact size and the low cost, corresponding constraints on resources can result. The greatest challenge among all is that distinguishing and revoking compromised sensors. Traditional techniques are used for keys pre-distributed among the sinks and sensors for pair wise key establishment and authentication. But this is not that much effective to provide authentication and due to this reason nodes are compromised. To overcome above mentioned problem, new framework was designed. The basic work in it is that to allow a three-tier general framework, use of any pair wise key pre-distribution scheme. The scheme requires two separate polynomial pools: the mobile polynomial pool and the static polynomial pool. Keys from this pool are used to strengthened the authentication mechanism between sink and node. For enhancing this, one way chain applied on pre-distributed password. This process has low computational cost and will increase the network resilience. In this process, there is possibility of actual data compromise and sink will not get requested data. Thereby employed, message digests to achieve data integrity by applying complex math on data to ensure that this data has not been tampered with on route to its final destination. Through detailed analysis, we will show that integrity of whole framework improves and assures the accuracy and consistency of data over its entire lifecycle.

References
  1. Amar Rasheed, and Rabi N. Mahapatra, "The Three-Tier Security Scheme in Wire-less Sensor Networks with Mobile Sinks" Computer Networks, Volume: 23, Issue: 5.
  2. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
  3. J. R. Douceur, "The Sybil Attack," Proc. First Int'l Workshop Peer-to- Peer Systems (IPTPS '02), Mar. 2002.
  4. H. Deng, W. Li, and D. P. Agrawal, "Routing Security in Wireless Ad Hoc Networks," Proc. IEEE Comm. Magazine, pp. 70-75, 2002.
  5. L. Eschenauer and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. ACM Conf. Computer Comm. Security (CCS '02), pp. 41-47, 2002.
  6. H. Chan, A. Perrig, and D. Song, "Random Key Pre-Distribution Schemes for Sensor Networks," Proc. IEEE Symp. Research in Security and Privacy, 2003. IBM Research Division, Almaden Research Center, 650 Harry Road, San Jose, Ca 95120- 6099.
  7. D. Liu, P. Ning, and R. Li. "Establishing Pair wise Keys in Distributed Sensor Net- works," Proc. 10th ACM Conf. Computers and Comm. Security (CCS '03), pp. 52-61, Oct. 2003.
  8. H. Chan, A. Perrig, and D. Song, "Key Distribution Techniques for Sensor Net- works," Wireless Sensor Networks, pp. 277-303, Kluwer Academic, 2004.
  9. L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol, 24, no. 11, pp. 770-772, Nov. 1981.
  10. S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," Proc. 10th ACM Conf. Computers and Comm. Security (CCS '03), pp. 62-72, Oct. 2003.
  11. D. Liu and P. Ning, "Location-Based Pair wise Key Establishments for Static Sensor Networks," Proc. First ACM Workshop Security Ad Hoc anSensor Networks, 2003
  12. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. o, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," Advances in Cryptology – CRYPTO '92, LNCS 740, pp. 471-486, 1993.
  13. A. Rasheed and R. N. Mahapatra, "A key pre-distribution scheme for heterogeneous sensor networks," The 5th International Wireless Communications and Mobile Computing Conference (IWCMC'09), pp. 263-268, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network One way hash chain Message Digest