Performance Analysis of Message Authentication Algorithms in Wireless Sensor Networks

被引:0
作者
Mohindru, Vandana [1 ]
Singh, Yashwant [1 ]
机构
[1] Jaypee Univ Informat Technol, Dept Comp Sci & Engn & IT, Waknaghat, Solan, India
来源
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17) | 2017年
关键词
Wireless Sensor Networks (WSN); Message Authentication; Security; Attacks; Node Clone Attack; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security in an important concern in Wireless Sensor Networks (WSN) because of wide range of applications like health care monitoring, wildlife monitoring, highway traffic monitoring, earthquake monitoring, and many military. applications. All these applications require information to be communicate in a secure way without any type of modification by attackers. Therefore, an authentication mechanism is needed to check the authenticity of messages that are communicated with in the network. This paper presents the extensive performance analysis of various message authentication algorithms in terms of communication overhead, computational overhead, memory overhead and security level. Also the paper proposed the lightweight message authentication algorithm that covers all the demerits of the algorithm discussed in literature. The proposed algorithm generates the fixed size hash digest that is used for the authentication of messages within WSN. Also, the proposed algorithm results in low communication overhead, computational overhead, memory overhead and attain high level of security.
引用
收藏
页码:468 / 472
页数:5
相关论文
共 21 条
  • [1] Abduvaliev Abror, 2009, 2009 9th International Symposium on Communications and Information Technology. ISCIT 2009, P982, DOI 10.1109/ISCIT.2009.5340992
  • [2] Al-Mashhadi H. M., 2014, PROC 2014 GLOBAL SUM, P1
  • [3] [Anonymous], 2008, IEEE 27 C COMP COMM
  • [4] Chang S., 2006, P 2006 ACM S INFORM, P311
  • [5] Sensor Network Security: A Survey
    Chen, Xiangqian
    Makki, Kia
    Yen, Kang
    Pissinou, Niki
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02): : 52 - 73
  • [6] LMAC: A Lightweight Message Authentication Code for Wireless Sensor Network
    Chowdhury, Amrita Roy
    DasBit, Sipra
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [7] LOCHA: A Light-Weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network
    Chowdhury, Amrita Roy
    Chatterjee, Tanusree
    DasBit, Sipra
    [J]. 5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 497 - 504
  • [8] On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
    de Meulenaer, Giacomo
    Gosset, Francois
    Standaert, Francois-Xavier
    Pereira, Olivier
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 580 - 585
  • [9] Gangwar P. K., 2014, RECENT ADV INNOVATIO, P1
  • [10] A dynamic TDMA based scheme for securing query processing in WSN
    Ghosal, Amrita
    Halder, Subir
    DasBit, Sipra
    [J]. WIRELESS NETWORKS, 2012, 18 (02) : 165 - 184