Information Science and Applications pp 27-34 | Cite as
A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network
Abstract
This paper presents an application of security protocol based-on mu-tual authentication procedure between involved entities that providing data and network security in wireless sensor environment communication. Through WSN, a user can access base station of wireless sensor networks and gets the data. This paper proposes a secure authentication protocol where involved enti-ties are mutual strongly verified before accessing the data. The proposal pro-vides secure features standards such as data integrity, mutual authentication and session key establishment. Furthermore, an extensive analysis shows that the proposed scheme possesses many advantages against popular attacks, achieves better efficiency and can be safeguard to real wireless sensor network applications.
Keywords
authentication protocol WSN sensor network ad hocPreview
Unable to display preview. Download preview PDF.
References
- 1.A. Perrig, R. Szewczyk, V. Web, D. Culler, J.D. Tygar, SPINS: Security protocol for sensor networks. In Proceeding of the 7th Annual International Conference on Mobile Computing and Networks (MOBBICOM 2001), Rome, Italy, July (2001).Google Scholar
- 2.P. Kumar, S. Cho, D.S. Lee, Y.D. Lee, H.J Lee, TriSec: A secure data framework for wire-less sensor networks using authenticated encryption. Int. J. Marit. Inf. Commun. Sci., 8, 129-135. (2010).Google Scholar
- 3.C. Karlof, D. Wagner, Secure routing in wireless sensor networks: Attacks and counter- measure. Ad Hoc Network, 293-315. (2003).Google Scholar
- 4.Z. Benenson, F. Gartner, D. Kesdogan,User Authentication in sensor network (extended ab-stract). In Proceedings of the Workshop on Sensor Networks Informatik. 34 Jahrestagung der Gesellschaft fur Informatik, Ulm, Germany, September (2004).Google Scholar
- 5.M. Luk, G. Mezzour, A. Perrig, V. Gligor, MiniSec: A secure sensor network communica-tion architecture. In Proceeding of the 6th International Conference on Information Pro-cessing in Sensor Networks, IPSN’07, Cambridge, MA, USA, 25-27 April 2007.Google Scholar
- 6.C.C. Chang, C.Y. Lee, Y.C Chiu, Enhanced Authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 2009, 32, 611-618Google Scholar
- 7.M.L. Das, Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Comm. 2009, 8, 1086-1090Google Scholar
- 8.D. He, Y. Gao, S. Chan, C. Chen, J Bu, An enhanced two-factor user authentication scheme in wireless sensor networks. Int. J. Ad-Hoc Sensor Wirel. Netw. 2010, 0, 1-11Google Scholar
- 9.K.H.M. Wong, Y Zheng, J. Cao, Wang, S. A dynamic user authentication scheme for wire-less sensor networks. In Proceedings of the IEEE International Conference on Sensor Net-works, Ubiquitous, and Trustworthy Computing (SUTC’06), Taichung, Taiwan, 5-7 June 2006Google Scholar
- 10.B. Vaidya, J.J.P.C, Rodrigues, J.H Park, User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int. J. Commun. Syst. 2010, 23, 1201-1222.Google Scholar
- 11.P. Kumar, A. J. Choudhury, M. Sain, S.G. Lee, H.J. Lee, RUASN: A Robust User Au-thentication Framework for Wireless Sensor Networks, Sensors, ISSN:1424-8220, 5020-5046; doi: 10.3390/s110505020, November 2011.