Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3010089.3010108acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdawConference Proceedingsconference-collections
research-article

Trust-ticket based authentication scheme for WSN multi-domain applications

Published: 10 November 2016 Publication History
  • Get Citation Alerts
  • Abstract

    With the increasing popularity of Wireless Sensor Networks (WSNs) in versatile domains demand crucial security concerns. Secure communication mechanisms in WSNs have been widely deployed to ensure confidentiality, authenticity and integrity of exchanging data. The authentication issue related to such networks has become a crucial service because the nodes are typically deployed in an unattended environment leaving them open to attack. Moreover, this is due to the resource-constrained nature of the sensor nodes, which are limited in computing power, data storage and communication capabilities. Any authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we propose an efficient trust-ticket based authentication protocol for multi-domain applications in WSNs. Through the security analysis, we demonstrate the robustness of our protocol against some well known attacks. Moreover, we perform an overall evaluation of our protocol through simulations in function of the network size, where we consider two scenarios according to the trusted authority number. The simulation results highlight the advantages of our protocol in terms of energy consumption.

    References

    [1]
    K. Pranjali, D-G. Khairnar, Manish Sharma. Trusted Lightweight Authentication Protocol used in Wireless Sensor Network. IJCA Proceedings on National Conference on Emerging Trends in Advanced Communication Technologies, pp. 1--4, 2015.
    [2]
    S-P. Singh, S-C. Sharma. Secure Clustering Protocols in Wireless Sensor Networks. Journal of Wireless Sensor Networks, pp. 1--10, 2016.
    [3]
    A. Tajeddine, A. Kayssi, A. Chehab, I. Elhaj. Authentication Schemes for Wireless Sensor Networks. 17th IEEE Mediterranean Electrotechnical Conference, pp. 367--372, 2014.
    [4]
    M. Ghonge, M-S. Kale. A Review on Implementation of Message Authentication Scheme for Elliptic Curve Cryptography in Wireless Sensor Networks. International Journal of Scientific Research in Science Engineering and Technology, Vol. 2, Num. 2, pp. 322--326, 2016.
    [5]
    A. Perring, R. Canetti, J. Tygar, D. Song. SPINS: Security Protocols for Sensor Networks. Journal Wireless Networks, Vol. 8, pp. 521--534, 2002.
    [6]
    M. Bohio, A. Miri. An authenticated broadcasting scheme for wireless ad hoc network. Proceedings of IEEE of CNSR IEEE Computer Society, pp. 69--75, 2004.
    [7]
    H. Tan, J. Zic, S. Jha, D. Ostry. Secure multi-hop Network Programming with Multiple One-way Key Chains. IEEE Transactions on Mobile Computing, Vol. 10, Num. 1, pp. 16--31, 2011.
    [8]
    S. Zeyu, J. Xiaohui, L. Yuanbo. HSKAS: A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks. International Journal of Security and Its Applications, Vol. 10, Num. 4, pp. 105--116, 2016.
    [9]
    N-P. Smart. Identity-based authenticated key agreement protocol based on Weil pairing. Electronics letters, Vol. 38, Num. 13, pp. 630--632, 2002.
    [10]
    J. Veena, G. Patle, Gajanan. A Game Theory Based Injected False Data Filter for WSN. International Journal of Scientific Research, Vol. 5, Num. 1, 2016.
    [11]
    S. Ozdemir, H. Cam. Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks. IEEE/ACM Transaction on Networking, Vol. 18, Num. 3, pp. 736--749, 2010.
    [12]
    A. Shamir. Identity-based Cryptosystems and Signature Schemes. Proceedings of CRYPTO'84. Springer-Verlag LNCS 196, pp. 47--53, 1984.
    [13]
    A. Sahai, B. Waters. Fuzzy Identity Based Encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Berlin Heidelberg, pp. 457--473, 2005.
    [14]
    R-R-S. Mohan, S. Vellaisamy. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks. Hindawi Publishing Corporation the e Scientific World Journal, pp. 1--16, 2016.
    [15]
    T. Lupu, I. Rudas, M. Demiralp, N. Mastorakis. Main types of attacks in wireless sensor networks. WSEAS International Conference. Proceedings of Recent Advances in Computer Engineering, Vol. 9, 2009.
    [16]
    W-R. Heinzelman, A. Chandrakasan, H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd IEEE Hawaii International Conference on System Sciences HICSS, Vol. 2, pp. 10, 2000.
    [17]
    G. Meulenaer, F. Gosset, F-X. Standaert, F-X Pereira. On the energy cost of communication and cryptography in wireless sensor networks. Proceedings of IEEE International Conference on Wireless and Mobile Computing, pp.580--585, 2008.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    BDAW '16: Proceedings of the International Conference on Big Data and Advanced Wireless Technologies
    November 2016
    398 pages
    ISBN:9781450347792
    DOI:10.1145/3010089
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • ANR: Agence Nationale pour la Recherche
    • LABSTICC: Labsticc

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 November 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Authentication
    2. IBE
    3. Public-key
    4. Security
    5. Trust-ticket
    6. WSNs

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    BDAW '16

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 60
      Total Downloads
    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media