Simple, Secure and Dynamic Protocol for Mutual Authentication of Nodes in Wireless Sensor Networks

被引:0
作者
Jain, Usha [1 ]
Hussain, Muzzammil [1 ]
机构
[1] Cent Univ Rajasthan, Dept Comp Sci & Engn, Ajmer, India
来源
PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT) | 2017年
关键词
Dynamic; Light weight; Node authentication; Token; Wireless Sensor Networks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks (WSN) are being used worldwide in many areas. As the application areas of the WSN are increasing at the same rate the security threats are also increasing. Intruders are applying various mechanisms to access the sensible and confidential data from sensors. Hence, strong security measures are much needed to immune WSNs from various attacks. Authentication is a security mechanism that protects WSNs from wide range of security attacks. In this paper, an authentication protocol is proposed to mutually authenticate sensor nodes in wireless sensor networks. The proposed protocol is based on tokens. Any node when deployed in WSN is embedded with base station's public key and through the corresponding cluster head; it requests and acquires its token for authentication from the base station. The generated token is light in weight and reduces much of computational, communicational and storage overheads. The proposed protocol is verified for its security both formally and automatically. The proposed protocol is proved to be secure by evaluation in BAN logic and found SAFE by AVISPA- a model checker tool for testing authentication protocol.
引用
收藏
页数:7
相关论文
共 17 条
[1]  
[Anonymous], 2004, ACM WORKSH SEC AD HO
[2]  
Blass Erik-Oliver, 2005, IWUC
[3]  
Boichut Y., 2007, 2 C SEC NETW ARCH IN
[4]  
Boyd Colin, 1993, WORKSH THEOR APPL CR
[5]   Motion entropy feature and its applications to event-based segmentation of sports video [J].
Chen, Chen-Yu ;
Wang, Jia-Ching ;
Wang, Jhing-Fa ;
Hu, Yu-Hen .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008, 2008 (1)
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]  
Fan Kai, 2009, IAS, V9
[8]  
Meadows C., 1994, INT C THEOR APPL CRY
[9]  
Nessett D. M., 1990, Operating Systems Review, V24, P35, DOI 10.1145/382258.382789
[10]  
Rathore R, 2015, EMERGING RES COMPUTI, P451