Abstract

The primary requirements of a secure Wireless Sensor Network architecture are confidentiality, integrity and authentication of users and other participating entities. User Authentication for wireless sensor networks is a fundamental and important issue in designing dependable and secure systems. In this thesis, we have outlined the security model, functional requirements, assumptions and network setup for an authentication scheme in the first phase. Keeping in mind the security requirements as well as the flaws of past authentication schemes, we propose a robust user authentication method that inherits user anonymity, mutual authentication and password changing functionality of previous password-based schemes and improves security by resisting gateway bypass and replay attack, and many logged in user with the same ID threat. Our scheme is a variant of strong password based schemes that does not require strict network synchronization. In the second phase of the thesis, we have analysed our authentication scheme from the perspective of security issues and functional requirements. The proposed scheme is modelled in SystemC. It is evaluated in different attack scenarios. The authentication latency, memory and functional requirements, and computational overhead are the metrics used to evaluate the scheme. The effect of multiple users on authentication latency in our scheme is also studied. Some of the past representative schemes have also been modelled and evaluated in the same environment. A detailed comparison of over-head cost, authentication latency and security features are provided in this thesis. It is verified and confirmed by modeling that our scheme provides enhanced security without adding extra computation at the sensor node.

Highlights

  • Introduction to wireless sensor network (WSN)The emerging field of Wireless Sensor Networks [2] combines sensing, computation and communication into a single tiny device

  • We have provided an overview of the evolution of wireless sensor networks

  • In this chapter we introduce Wireless Sensor Network (WSN)

Read more

Summary

Introduction

Introduction to WSNThe emerging field of Wireless Sensor Networks [2] combines sensing, computation and communication into a single tiny device. Are not suitable for a resource-constrained WSN network These constraints arise out of limitation in computational power of the nodes, limitation in communication over the open medium and limitation in deployment strategies. We provide a detail description of the security goal and model of an authentication scheme. DARPA acted as a pioneer in sensor network research by launching Low-power Wireless Integrated Micro-sensors (LWIM) project during mid-1990s and continued the initiative research program called SensIT [25]. It provided the present sensor networks with new capabilities such as ad hoc networking, dynamic querying and tasking, reprogramming and multitasking. Since 1993, the Wireless Integrated Network Sensors (WINS) project at the University of California at

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.