An Efficient Security Scheme Providing Authentication and Pairwise Key Distribution with Mobile Sinks in Wsn’s

نویسندگان

  • S Uma
  • Manjula Devi
چکیده

Sensor networks may be deployment in hostile environments, especially in military applications. Small low cost sensor devices each equipped with limited resources are networked and are used for various critical applications. Making such sensor network secure is a challenging issue. Under such situations, the sensors may be captured, and the data may be intercepted and/or modified by the attacker. Therefore security services such as authentication and pair wise key establishment is a critical issue to maintain network operations. In the traditional schemes an attacker can easily obtain large number of keys by capturing small fraction of nodes and initiate data communication with any sensor node. Here the main focus is on the sensor network that uses mobile sink to gather the sensed data from the network. A new security techniqueThree tier security scheme is proposed to provide authentication and pair wise key establishment between sensor nodes and mobile sinks. The proposed scheme makes use of two polynomials pools: static polynomial pool and mobile polynomial pool which will improve network resilience to the mobile sink replication attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Mathematical Model of Security Framework for Routing Layer Protocol in Wireless Sensor Networks ¬リニ

Most of the environmental and non-attended applications of Wireless Sensor Networks (WSN’s) need mobile sensor nodes. However, mobility of sensor nodes increases security issues in WSNs and it’s also vulnerable to various kinds of attacks. Dynamic WSN emerges two most common issues related to the authentication of moving sensor nodes and security in communication and key distribution. After pos...

متن کامل

A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems

M2M (machine to machine) applications involving intelligence to ubiquitous environment have been in existence for the past many years. However, its provisioning using mobile technologies raises a new security challenge. Security services such as authentication and key establishment are critical in M2M, especially for healthcare systems. We proposed a simple architecture M2M service to apply any...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013