A trust enhancement scheme for cluster-based wireless sensor networks

被引:6
作者
Wang, Tianshu [1 ]
Hu, Kongfa [1 ]
Xichen Yang [2 ]
Gongxuan, Zhang [3 ]
Wang, Yongli [3 ]
机构
[1] Nanjing Univ Chinese Med, Sch Informat Technol, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
WSNs; Trust enhancement; Authentication protocol; Trusted Platform Module; Network life cycle; ENERGY-EFFICIENT; AUTHENTICATION; ALGORITHM;
D O I
10.1007/s11227-018-2693-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is crucial in wireless sensor networks (WSNs) since a growing variety of applications require strict security. Cluster-based architecture has an enhancement in the system performance of WSNs. This article presents a trust enhancement scheme for cluster-based WSNs, where network time is divided into multiple rounds. Each round contains a setup phase and a steady-state phase. In the setup phase, clusters are formed and mutual trusted relationships between cluster nodes are established through two proposed authentication protocols called SET-TESLA (Setup TESLA) and SET-SCHNORR (Setup SCHNORR). SET-TESLA uses the authenticated broadcast TESLA scheme and reduces the iterations of hash function to improve the energy efficiency, while SET-SCHNORR applies a lightweight signature SCHNORR scheme. In the steady-state phase, collected environmental or physical data are transmitted through the proposed STEADY-TESLA protocol (Steady-state TESLA), which guarantees the data credibility. The analysis demonstrates that the security scheme does well in resisting such attacks as data confidentiality attacks, data integrity attacks and compromise node attacks. In addition, the results of calculations and simulations show that the proposed scheme performs better than the existing security protocols in terms of communication overhead and energy consumption.
引用
收藏
页码:2761 / 2788
页数:28
相关论文
共 37 条
[1]   A survey on clustering algorithms for wireless sensor networks [J].
Abbasi, Ameer Ahmed ;
Younis, Mohamed .
COMPUTER COMMUNICATIONS, 2007, 30 (14-15) :2826-2841
[2]  
[Anonymous], 3174 IETF RFC
[3]   A distributed algorithm for energy efficient and fault tolerant routing in wireless sensor networks [J].
Azharuddin, Md ;
Jana, Prasanta K. .
WIRELESS NETWORKS, 2015, 21 (01) :251-267
[4]  
Challener David., 2007, PRACTICAL GUIDE TRUS, Vfirst
[5]   An improved key distribution mechanism for large-scale hierarchical wireless sensor networks [J].
Cheng, Yi ;
Agrawal, Dharma P. .
AD HOC NETWORKS, 2007, 5 (01) :35-48
[6]  
Das S. R., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P3, DOI 10.1109/INFCOM.2000.832168
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]  
Fouchal H, 2017, IEEE GLOB COMM CONF, P1
[9]   Securing transmissions between nodes of WSN using TPM [J].
Furtak, Janusz ;
Chudzikiewicz, Jan .
PROCEEDINGS OF THE 2015 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 5 :1059-1068
[10]   The capacity of wireless networks [J].
Gupta, P ;
Kumar, PR .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (02) :388-404