Skip to main content
Log in

Improved Authentication in Secured Multicast Wireless Sensor Network (MWSN) Using Opposition Frog Leaping Algorithm to Resist Man-in-Middle Attack

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless Sensor Networks (WSNs) in modern times enables security techniques to secure the information transmitted via the interconnected network. The poor security services in WSN environment erupts to more attacks and misbehavior of nodes. Hence, it requires an effective security mechanism that should avoid the degradation of network performance with security flaws. In these regards, the sensor node authentication becomes critical with increased attacks and threats, and with increasing communication between the sensor nodes. Hence, the complexity associated with security protocols increases and that enables the networks to misbehave. In this paper, we design a light-weight authentication mechanism using a dual topology in multicast WSNs. It is the authentication is improved using EdDS Algorithm (EdDSA) with an XOR functionality. Finally, the uncertainty in choosing the misbehaving nodes for further communication is optimally found by a theoretical game model. This avoids the illegitimate access of non-malicious nodes in multicast environment, while it ensures fastest authentication. In this way, the authentication of the nodes in the network is tested and validated against man-in-middle attack. The simulation results show that the proposed EdDSA-XOR functionality has 0.13% and 0.07% of reduced time consumption and reduced energy consumption, respectively than other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

The data that support the findings of this study are available from the corresponding author, upon reasonable request.

Code availability (software application or custom code)

The code that is used this study are available from the corresponding author, upon reasonable request.

Abbreviations

N :

Base node

q :

Probability

Su :

Success

Pn :

Penalty

Rw :

Reward

Wm :

Wimpy

Acc :

Accept

Rej :

Reject

β :

Belief Assessment

\(\mu\) :

Belief Probability

p,L :

Odd prime number

b :

Bits

H :

Cryptographic hash function

c or n :

Integer

Rw :

Reward

Pn :

Penalty

Su :

Surly

Wm :

Wimpy

Acc :

Accept

Rej :

Reject

d,a :

Non-square element

GF :

Galois field

B :

Element

E :

Elliptical curve

PH :

Prehash or identity function

M :

Key length of the output

EN :

Encode

Rw :

Reward

Pn :

Penalty

Su :

Surly

Wm :

Wimpy

Acc :

Accept

Rej :

Reject

β 1(a|b):

Probability of c type relevant to node n1 after the selection of a

β 2(a|b):

Probability of b type relevant to node n1 after viewing c

μ(a|b):

Guessing of n2 from the node n1 by viewing c

ui(a|b|c):

Pay-off factor, which is associated with sent message by the node n1 or the action selected by n2

References

  1. Yang, H., Ye, F., Yuan, Y., Lu, S. and Arbaugh, W., 2005, May. Toward resilient security in wireless sensor networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 34–45). ACM.

  2. Sajay, K. R., Babu, S. S., & Vijayalakshmi, Y. (2019).Enhancing the security of cloud data using hybrid encryption algorithm.Journal of Ambient Intelligence and Humanized Computing, 1–10.

  3. Kaja, S., Shakshuki, E. M., Guntuka, S., & Malik, H. (2019). Acknowledgment scheme using cloud for node networks with energy-aware hybrid scheduling strategy. Journal of Ambient Intelligence and Humanized Computing, 11, 1–16.

    Google Scholar 

  4. Zhang, P., Wang, J., & Li, W. (2020). A learning based joint compressive sensing for wireless sensing networks. Computer Networks, 168, 107030.

    Article  Google Scholar 

  5. Riaz, R., Gillani, N. U. A., Rizvi, S., Shokat, S., & Kwon, S. J. (2019). SUBBASE: An authentication scheme for wireless sensor networks based on user biometrics. Wireless Communications and Mobile Computing, 2019, 1–11.

    Article  Google Scholar 

  6. Resendes, S., Carreira, P., & Santos, A. C. (2014). Conflict detection and resolution in home and building automation systems: A literature review. Journal of Ambient Intelligence and Humanized Computing, 5(5), 699–715.

    Article  Google Scholar 

  7. Mekuria, D. N., Sernani, P., Falcionelli, N., & Dragoni, A. F. (2019). Smart home reasoning systems: a systematic literature review. Journal of Ambient Intelligence and Humanized Computing, 12, 1–18.

    Google Scholar 

  8. Wang, G., Zhang, W., Cao, G. and La Porta, T., 2003, October. On supporting distributed collaboration in sensor networks. In Military Communications Conference, 2003.MILCOM'03.2003 IEEE (Vol. 2, pp. 752–757).IEEE.

  9. Zhu, S., Setia, S., Jajodia, S. and Ning, P., 2004, May. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Security and privacy, 2004.Proceedings.2004 IEEE symposium on (pp. 259–271).IEEE.

  10. Yin, W., Hu, P., Wen, J., & Zhou, H. (2020). ACK spoofing on MAC-layer rate control: Attacks and defenses. Computer Networks, 171, 107133.

    Article  Google Scholar 

  11. Ye, F., Luo, H., Lu, S., & Zhang, L. (2005). Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 839–850.

    Article  Google Scholar 

  12. Zhang, Y., Yang, J., Li, W., Wang, L., & Jin, L. (2010). An authentication scheme for locating compromised sensor nodes in WSNs. Journal of Network and Computer Applications, 33(1), 50–62.

    Article  Google Scholar 

  13. Nandu, P., & Shekokar, N. (2015). An enhanced authentication mechanism to secure re-programming in WSN. Procedia Computer Science, 45, 397–406.

    Article  Google Scholar 

  14. Kumari, S., Li, X., Wu, F., Das, A. K., Arshad, H., & Khan, M. K. (2016). A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems, 63, 56–75.

    Article  Google Scholar 

  15. He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263–277.

    Article  Google Scholar 

  16. Ma, X., Zhang, P., Theel, O., & Wei, J. (2020). Gathering data with packet-in-packet in wireless sensor networks. Computer Networks, 170, 107124.

    Article  Google Scholar 

  17. Shankar, S. K., Tomar, A. S., & Tak, G. K. (2015). Secure medical data transmission by using ECC with mutual authentication in WSNs. Procedia Computer Science, 70, 455–461.

    Article  Google Scholar 

  18. Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2016). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956–963.

    Article  Google Scholar 

  19. Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37–48.

    Article  Google Scholar 

  20. Moon, A. H., Iqbal, U., & Bhat, G. M. (2016). Mutual entity authentication protocol based on ECDSA for WSN. Procedia Computer Science, 89, 187–192.

    Article  Google Scholar 

  21. Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.

    Article  Google Scholar 

  22. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. Workshop on the theory and application of cryptographic techniques (pp. 47–53). Berlin Heidelberg: Springer.

    Google Scholar 

  23. Benzaid, C., Lounis, K., Al-Nemrat, A., Badache, N., & Alazab, M. (2016). Fast authentication in wireless sensor networks. Future Generation Computer Systems, 55, 362–375.

    Article  Google Scholar 

  24. Xu, J., Zhu, W. T., & Feng, D. G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces, 31(4), 723–728.

    Article  Google Scholar 

  25. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644–654.

    Article  MathSciNet  Google Scholar 

  26. Mahmood, K., Chaudhry, S. A., Naqvi, H., Shon, T., & Ahmad, H. F. (2016). A lightweight message authentication scheme for smart grid communications in power sector. Computers & Electrical Engineering, 52, 114–124.

    Article  Google Scholar 

  27. Liu, C. H., & Chung, Y. F. (2016). Secure user authentication scheme for wireless healthcare sensor networks. Computers & Electrical Engineering, 59, 250–261.

    Article  Google Scholar 

  28. Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147–169.

    Article  Google Scholar 

  29. Grover, K., & Lim, A. (2015). A survey of broadcast authentication schemes for wireless networks. Ad Hoc Networks, 24, 288–316.

    Article  Google Scholar 

  30. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.

    Article  MathSciNet  Google Scholar 

  31. Moon, A. H., Iqbal, U., & Bhat, G. M. (2016). Implementation of Node Authentication for WSN Using Hash Chains. Procedia Computer Science, 89, 90–98.

    Article  Google Scholar 

  32. Ramachandran, S., & Shanmugam, V. (2017). A two way authentication using bilinear mapping function for wireless sensor networks. Computers & Electrical Engineering, 59, 242–249.

    Article  Google Scholar 

  33. Amin, R., & Biswas, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58–80.

    Article  Google Scholar 

Download references

Funding

The author(s) received no financial support for the research, authorship, and/or publication of this article.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization: NY; Methodology: KP, RAR; Formal analysis and investigation: TK, KP; Writing—original draft preparation: RAR, KP, TK; Writing—review and editing: KP, RAR, TK.

Corresponding author

Correspondence to N. Yuvaraj.

Ethics declarations

Conflict of interest

The author(s) have no conflict of interest to declare.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yuvaraj, N., Raja, R.A., Karthikeyan, T. et al. Improved Authentication in Secured Multicast Wireless Sensor Network (MWSN) Using Opposition Frog Leaping Algorithm to Resist Man-in-Middle Attack. Wireless Pers Commun 123, 1715–1731 (2022). https://doi.org/10.1007/s11277-021-09209-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09209-1

Keywords

Navigation