A light-weight authentication scheme for wireless sensor networks

被引:64
作者
Delgado-Mohatar, Oscar [1 ]
Fuster-Sabater, Amparo [1 ]
Sierra, Jose M. [2 ]
机构
[1] CSIC, Inst Fis Aplicada, Madrid, Spain
[2] Univ Carlos III Madrid, Dept Informat, Madrid, Spain
关键词
Wireless sensor networks; Key management protocol; Light-weight authentication protocol; Energy consumption;
D O I
10.1016/j.adhoc.2010.08.020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sensor networks are ad hoc mobile networks that include sensor nodes with limited computational and communication capabilities. They have become an economically viable monitoring solution for a wide variety of applications. Obviously, security threats need to be addressed and, taking into account its limited resources, the use of symmetric cryptography is strongly recommended. In this paper, a light-weight authentication model for wireless sensor networks composed of a key management and an authentication protocol is presented. It is based on the use of simple symmetric cryptographic primitives with very low computational requirements, which obtains better results than other proposals in the literature. Compared to SPINS and BROSK protocols, the proposal can reduce energy consumption by up to 98% and 67%, respectively. It also scales well with the size of the network, due to it only requiring one interchanged message, independently of the total number of nodes in the network (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:727 / 735
页数:9
相关论文
共 26 条
[1]   Energy conservation in wireless sensor networks: A survey [J].
Anastasi, Giuseppe ;
Conti, Marco ;
Di Francesco, Mario ;
Passarella, Andrea .
AD HOC NETWORKS, 2009, 7 (03) :537-568
[2]  
ANDERSON R, 2004, P ICNP 04 OCT
[3]  
[Anonymous], 2003, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, DOI [10.1145/986858.986869, DOI 10.1145/986858.986869]
[4]   Public-key cryptography for RFID-tags [J].
Batina, L. ;
Guajardo, J. ;
Kerins, T. ;
Mentens, N. ;
Tuyls, P. ;
Verbauwhede, I. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, :217-+
[5]  
BOHGE M, 2003, WISE 03, P79
[6]  
Carman D. W., 2000, 010 NAI LAB SEC RES
[7]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[8]  
Du W., 2003, CCS 03, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[9]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
[10]   Analysis of area-congestion-based DDoS attacks in ad hoc networks [J].
Gu, Qijun ;
Liu, Peng ;
Chu, Chao-Hsien .
AD HOC NETWORKS, 2007, 5 (05) :613-625