Abstract
Wireless Sensor Networks (WSNs) in modern times enables security techniques to secure the information transmitted via the interconnected network. The poor security services in WSN environment erupts to more attacks and misbehavior of nodes. Hence, it requires an effective security mechanism that should avoid the degradation of network performance with security flaws. In these regards, the sensor node authentication becomes critical with increased attacks and threats, and with increasing communication between the sensor nodes. Hence, the complexity associated with security protocols increases and that enables the networks to misbehave. In this paper, we design a light-weight authentication mechanism using a dual topology in multicast WSNs. It is the authentication is improved using EdDS Algorithm (EdDSA) with an XOR functionality. Finally, the uncertainty in choosing the misbehaving nodes for further communication is optimally found by a theoretical game model. This avoids the illegitimate access of non-malicious nodes in multicast environment, while it ensures fastest authentication. In this way, the authentication of the nodes in the network is tested and validated against man-in-middle attack. The simulation results show that the proposed EdDSA-XOR functionality has 0.13% and 0.07% of reduced time consumption and reduced energy consumption, respectively than other methods.
Similar content being viewed by others
Data Availability
The data that support the findings of this study are available from the corresponding author, upon reasonable request.
Code availability (software application or custom code)
The code that is used this study are available from the corresponding author, upon reasonable request.
Abbreviations
- N :
-
Base node
- q :
-
Probability
- Su :
-
Success
- Pn :
-
Penalty
- Rw :
-
Reward
- Wm :
-
Wimpy
- Acc :
-
Accept
- Rej :
-
Reject
- β :
-
Belief Assessment
- \(\mu\) :
-
Belief Probability
- p,L :
-
Odd prime number
- b :
-
Bits
- H :
-
Cryptographic hash function
- c or n :
-
Integer
- Rw :
-
Reward
- Pn :
-
Penalty
- Su :
-
Surly
- Wm :
-
Wimpy
- Acc :
-
Accept
- Rej :
-
Reject
- d,a :
-
Non-square element
- GF :
-
Galois field
- B :
-
Element
- E :
-
Elliptical curve
- PH :
-
Prehash or identity function
- M :
-
Key length of the output
- EN :
-
Encode
- Rw :
-
Reward
- Pn :
-
Penalty
- Su :
-
Surly
- Wm :
-
Wimpy
- Acc :
-
Accept
- Rej :
-
Reject
- β 1(a|b):
-
Probability of c type relevant to node n1 after the selection of a
- β 2(a|b):
-
Probability of b type relevant to node n1 after viewing c
- μ(a|b):
-
Guessing of n2 from the node n1 by viewing c
- ui(a|b|c):
-
Pay-off factor, which is associated with sent message by the node n1 or the action selected by n2
References
Yang, H., Ye, F., Yuan, Y., Lu, S. and Arbaugh, W., 2005, May. Toward resilient security in wireless sensor networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 34–45). ACM.
Sajay, K. R., Babu, S. S., & Vijayalakshmi, Y. (2019).Enhancing the security of cloud data using hybrid encryption algorithm.Journal of Ambient Intelligence and Humanized Computing, 1–10.
Kaja, S., Shakshuki, E. M., Guntuka, S., & Malik, H. (2019). Acknowledgment scheme using cloud for node networks with energy-aware hybrid scheduling strategy. Journal of Ambient Intelligence and Humanized Computing, 11, 1–16.
Zhang, P., Wang, J., & Li, W. (2020). A learning based joint compressive sensing for wireless sensing networks. Computer Networks, 168, 107030.
Riaz, R., Gillani, N. U. A., Rizvi, S., Shokat, S., & Kwon, S. J. (2019). SUBBASE: An authentication scheme for wireless sensor networks based on user biometrics. Wireless Communications and Mobile Computing, 2019, 1–11.
Resendes, S., Carreira, P., & Santos, A. C. (2014). Conflict detection and resolution in home and building automation systems: A literature review. Journal of Ambient Intelligence and Humanized Computing, 5(5), 699–715.
Mekuria, D. N., Sernani, P., Falcionelli, N., & Dragoni, A. F. (2019). Smart home reasoning systems: a systematic literature review. Journal of Ambient Intelligence and Humanized Computing, 12, 1–18.
Wang, G., Zhang, W., Cao, G. and La Porta, T., 2003, October. On supporting distributed collaboration in sensor networks. In Military Communications Conference, 2003.MILCOM'03.2003 IEEE (Vol. 2, pp. 752–757).IEEE.
Zhu, S., Setia, S., Jajodia, S. and Ning, P., 2004, May. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Security and privacy, 2004.Proceedings.2004 IEEE symposium on (pp. 259–271).IEEE.
Yin, W., Hu, P., Wen, J., & Zhou, H. (2020). ACK spoofing on MAC-layer rate control: Attacks and defenses. Computer Networks, 171, 107133.
Ye, F., Luo, H., Lu, S., & Zhang, L. (2005). Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 839–850.
Zhang, Y., Yang, J., Li, W., Wang, L., & Jin, L. (2010). An authentication scheme for locating compromised sensor nodes in WSNs. Journal of Network and Computer Applications, 33(1), 50–62.
Nandu, P., & Shekokar, N. (2015). An enhanced authentication mechanism to secure re-programming in WSN. Procedia Computer Science, 45, 397–406.
Kumari, S., Li, X., Wu, F., Das, A. K., Arshad, H., & Khan, M. K. (2016). A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems, 63, 56–75.
He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263–277.
Ma, X., Zhang, P., Theel, O., & Wei, J. (2020). Gathering data with packet-in-packet in wireless sensor networks. Computer Networks, 170, 107124.
Shankar, S. K., Tomar, A. S., & Tak, G. K. (2015). Secure medical data transmission by using ECC with mutual authentication in WSNs. Procedia Computer Science, 70, 455–461.
Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2016). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956–963.
Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37–48.
Moon, A. H., Iqbal, U., & Bhat, G. M. (2016). Mutual entity authentication protocol based on ECDSA for WSN. Procedia Computer Science, 89, 187–192.
Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. Workshop on the theory and application of cryptographic techniques (pp. 47–53). Berlin Heidelberg: Springer.
Benzaid, C., Lounis, K., Al-Nemrat, A., Badache, N., & Alazab, M. (2016). Fast authentication in wireless sensor networks. Future Generation Computer Systems, 55, 362–375.
Xu, J., Zhu, W. T., & Feng, D. G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces, 31(4), 723–728.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644–654.
Mahmood, K., Chaudhry, S. A., Naqvi, H., Shon, T., & Ahmad, H. F. (2016). A lightweight message authentication scheme for smart grid communications in power sector. Computers & Electrical Engineering, 52, 114–124.
Liu, C. H., & Chung, Y. F. (2016). Secure user authentication scheme for wireless healthcare sensor networks. Computers & Electrical Engineering, 59, 250–261.
Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147–169.
Grover, K., & Lim, A. (2015). A survey of broadcast authentication schemes for wireless networks. Ad Hoc Networks, 24, 288–316.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.
Moon, A. H., Iqbal, U., & Bhat, G. M. (2016). Implementation of Node Authentication for WSN Using Hash Chains. Procedia Computer Science, 89, 90–98.
Ramachandran, S., & Shanmugam, V. (2017). A two way authentication using bilinear mapping function for wireless sensor networks. Computers & Electrical Engineering, 59, 242–249.
Amin, R., & Biswas, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58–80.
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.
Author information
Authors and Affiliations
Contributions
Conceptualization: NY; Methodology: KP, RAR; Formal analysis and investigation: TK, KP; Writing—original draft preparation: RAR, KP, TK; Writing—review and editing: KP, RAR, TK.
Corresponding author
Ethics declarations
Conflict of interest
The author(s) have no conflict of interest to declare.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yuvaraj, N., Raja, R.A., Karthikeyan, T. et al. Improved Authentication in Secured Multicast Wireless Sensor Network (MWSN) Using Opposition Frog Leaping Algorithm to Resist Man-in-Middle Attack. Wireless Pers Commun 123, 1715–1731 (2022). https://doi.org/10.1007/s11277-021-09209-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09209-1