Efficient User and Broadcast Authentication Scheme for WSNs

被引:0
作者
Alabrah, Amerah [1 ,2 ]
Bassiouni, Mostafa [1 ]
机构
[1] Univ Cent Florida, Dept Elect Engn & Comp Sci, Orlando, FL 32816 USA
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
来源
2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC) | 2014年
关键词
WSN; one-way hash chain; SHA-1; MOHC;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks are collections of tiny sensors working collaboratively to gather information. Two major shortcomings of today's WSNs are scarce energy and memory resources making it difficult to devise robust and effective security measures. Keyed-hash chains have been proposed as an efficient solution. Nevertheless, the basic configuration of one-way hash chains, where a shared key is hashed with no limits on the length of the chain causes an unwanted computational overhead and a potential security breach. In this paper, we propose a mini one-way hash chain protocol for user and broadcast authentication that is as effective, while at the same time significantly reducing the computational overhead. We avoid the potential security breach by using easily computed one time authentication tokens to secure communication. We also demonstrate that our protocol is energy preserving, light and efficient. Our simulation and evaluation tests reflect its benefit over straightforwardly configured one-way hash chains.
引用
收藏
页码:3052 / 3057
页数:6
相关论文
共 17 条
  • [1] Enhancing security of cookie-based sessions in mobile networks using sparse caching
    Alabrah, Amerah
    Cashion, Jeffrey
    Bassiouni, Mostafa
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 355 - 366
  • [2] Alabrah A, 2012, IEEE GLOB COMM CONF, P868, DOI 10.1109/GLOCOM.2012.6503222
  • [3] [Anonymous], SENS NETW UB TRUSTW
  • [4] Arikumar K. S., 2011, 2011 Proceedings of International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011), P1010, DOI 10.1109/ICETECT.2011.5760267
  • [5] Benenson Z., 2005, REAL WORLD WIRELESS, V14
  • [6] Butun I., 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC 2011), P169, DOI 10.1109/CCNC.2011.5766446
  • [7] Cheikhrouhou O., 2010, P ACS IEEE INT C COM, P1, DOI DOI 10.1109/AICCSA.2010.5586995
  • [8] One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens
    Dacosta, Italo
    Chakradeo, Saurabh
    Ahamad, Mustaque
    Traynor, Patrick
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2012, 12 (01)
  • [9] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [10] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    [J]. SENSORS, 2010, 10 (03) : 2450 - 2459