Abstract

Wireless Sensor Networking continues to evolve as one of the most challenging research areas. Considering the insecure nature of these networks and the fact that sensor nodes are distributed in a hostile environment, having a well-implemented security scheme is absolutely essential. Bearing in mind the important security services like authentication and access control, we have proposed a novel security framework for these networks. The new framework is based on Kerberos authentication and access control system. The Kerberos has been adopted for WSNs by utilizing Bloom Filter data structure and Elliptic Curve cryptography. In the proposed scheme, Bloom Filter data structure is used in a novel way; we have used this data structure to get rid of Public Key’s certificates. By combining Bloom Filter data structure and Elliptic Curve cryptography, we achieved a very light robust security framework that offers Authentication, Access Control, and key sharing services. The analysis results showed that our scheme provides more security services and is more robust in the presence of attacks compared to the previous schemes. In contrast, simulation results indicated that our system had significant improvements over the other schemes in many aspects such as power and time expenditure.

Highlights

  • Following the recent advances in micro-electromechanical systems (MEMS) technology, wireless communications, and digital electronics, it is technically and economically practical to manufacture a large number of small and low-cost sensors [1]

  • The Kerberos has been adopted for Wireless Sensor Networks (WSNs) by utilizing Bloom Filter data structure and Elliptic Curve cryptography

  • The reason of this outcome is that we utilized public key method for key sharing, which is more secure than other methods and scales well on WSNs compared to symmetric methods

Read more

Summary

Introduction

Following the recent advances in micro-electromechanical systems (MEMS) technology, wireless communications, and digital electronics, it is technically and economically practical to manufacture a large number of small and low-cost sensors [1]. The Wireless Sensor Networks (WSNs) are formed by distributing a large number of sensor nodes in the environment and assigning a base station to the area. These networks have a wide variety of applications such as military, environmental, healthcare, home and commercial applications [2]. In military applications, sensor nodes are used for gathering data from the battlefield where there always is a possibility of tapping on communications and even capturing sensor nodes Considering these facts, there ought to be mechanisms to establish security services with the respect to the constraints of WSNs. Security services cover Integrity, Confidentiality, Authentication, Access Control, and Non-repudiation. Access Control services are necessary when we have users with several levels of access permissions [10] [11]

Related works
Elliptic curve cryptography
Bloom filter
The proposed idea
Network initialization
Authentication and key sharing
Access controlling and ticket issuing
Accessing the network
Optional phases
Security analysis
Replay attack
Sniffing
Denial-of-service attack
Node replication
Use of tamper resistance
Simulation and performance evaluation
Methods
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.