Advertisement

Cluster Computing

, Volume 22, Supplement 5, pp 10637–10648 | Cite as

Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks

  • Ayush SoganiEmail author
  • Aman Jain
Article
  • 113 Downloads

Abstract

Wireless sensor networks described as an emerging new technology with a very promising future. Advances made in wireless sensor networks (WSNs) are the merging of advanced electronic and wireless technologies. Due to the popularity gained by the wireless environment, Security is the main concern. Node authentication without compromising lifespan of the networks is practically a daunting task. This research work introduces a new model, IBE-ECC that administers the energy of sensor nodes with faster authentication process. Signature verification model is deployed to achieve faster authentication process. Nevertheless, the public key-based strategies eliminate the security process but their verification process takes larger time. Therefore, authentication speed is a major constraint of our research endeavor. The proposed scheme is design to achieve high security and fast authentication with energy efficiency. It uses identity-based encryption on elliptic curve cryptography and a user authentication with an energy efficient key management. Further, to improve the speed of the authentication, it reduces the signature size so that it would accelerate signature verification faster. Hence, the proposed scheme will provide a secure key management, energy efficiency, fast authentication and additionally, computation overhead and communication costs are minimized. Finally, the experimental result demonstrates that the proposed strategy obtains 4797 ms higher execution efficiency and 45. 53% lower computation costs than existing schemes.

Keywords

Wireless sensor network Fast authentication Energy efficient key management Elliptic curve cryptography (ECC)  and Identity based encryption 

References

  1. 1.
    Akyildi, I.F., Su, W., Sankarasubramaniam, Y., et al.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Romer, K., Mattern, F., et al.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11(6), 54–61 (2004)CrossRefGoogle Scholar
  3. 3.
    Sivaraman, E.: An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring. Ad Hoc Netw. 11(3), 798–817 (2013)CrossRefGoogle Scholar
  4. 4.
    Owojaiye, G., Sun, Y., et al.: Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring. Ad Hoc Netw. 11(3), 1237–1253 (2013)CrossRefGoogle Scholar
  5. 5.
    Sun, E.A., et al.: Mise-pipe: magnetic induction-based wireless sensor networks for underground pipeline monitoring. Ad Hoc Netw. 9(3), 218–227 (2011)CrossRefGoogle Scholar
  6. 6.
    Bottero, M., Dalla Chiara, B., Defiorio, F., et al.: Wireless sensor networks for traffic monitoring in a logistics centre. Transp. Res. Part C Emerg. Technol. 26, 99–124 (2013)CrossRefGoogle Scholar
  7. 7.
    Ramesh, M.: Design, development, and deployment of a wireless sensor network for detection of landslides. Ad Hoc Netw. 13, 2–18 (2012)CrossRefGoogle Scholar
  8. 8.
    Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M., et al.: An efficient broadcast authentication scheme in wireless sensor networks. In Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS’06, pp. 311–320 (2006)Google Scholar
  9. 9.
    Lee, J., Kim, S., Cho, Y., Chung, Y., Park, Y., et al.: HORSIC: an efficient one-time signaturescheme for wireless sensor networks. Inf. Process. Lett. 112(20), 783–787 (2012)CrossRefGoogle Scholar
  10. 10.
    Turkanovi’c, M., Hlbl, M., et al.: Notes on a temporal-credential-based mutual authentication and key agreement scheme for wireless sensornetworks. Wirel. Pers. Commun. 77(2), 907–922 (2013)CrossRefGoogle Scholar
  11. 11.
    Hongbin, M., Yingli, W., Shuang, Y., et al.: Hybrid keymanagement mechanism based on double cluster head structure, 2nd International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), IEEE, pp. 1164–1167, (2012)Google Scholar
  12. 12.
    Fan, Y., et al.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Commun. Syts. 36(1), 316–323 (2012)Google Scholar
  13. 13.
    Wong, K.H.M., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1, p. 8–17 (2006)Google Scholar
  14. 14.
    Das, A.K., et al.: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5), 1646–1656 (2012)CrossRefGoogle Scholar
  15. 15.
    Odelu V, Das A.K., Alghathbar and Khan et al.: A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Secur. Commun. Netw. (2011)Google Scholar
  16. 16.
    Chen, T., Shih, W.: A robust mutual authentication protocol for wireless sensor networks. Etri J. 32(5), 704–712 (2012)CrossRefGoogle Scholar
  17. 17.
    Jiang, Q., J. Ma., Lu, X., Tian, Y. et al.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. (2014)Google Scholar
  18. 18.
    Chun, C., Daojing, H., Sammy, C., Jiajun, B., Yi, G., Rong, F.: Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3), 347–62 (2014)CrossRefGoogle Scholar
  19. 19.
    Amin, R., Biswas, G.P., et al.: A novel user authentication and key agreement protocol for accessing multi medical server usable in TMIS. J. Med. Syst. 39(3), 33 (2015)CrossRefGoogle Scholar
  20. 20.
    Shim, K.-A., Lee, Y.-R., Park, C.-M.: EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)CrossRefGoogle Scholar
  21. 21.
    Benzaid, C., Saiah, A., Badache, N.: An enhanced secure pairwise broadcast time synchronization protocol in wireless sensor networks. In Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed, and Network based Processing, PDP’2014, pp. 569–573 (2014)Google Scholar
  22. 22.
    Varatharajan, R., Manogaran, G., Priyan, M.K., Sundarasekar, R.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput. 1, 1–10 (2017)Google Scholar
  23. 23.
    Varatharajan, R., Manogaran, G., Priyan, M.K., Balaş, V.E., Barna, C.: Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed. Tools Appl. 1, 1–21 (2017)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.The IIS UniversityJaipurIndia
  2. 2.Maharishi Arvind Institute of Science and ManagementJaipurIndia

Personalised recommendations