Abstract

The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance. All such types of applications based on wireless mobile sensor network are generally using real time data, most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network. This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station. But this leads to a serious security breach and degrades the performance of any security protocol available in this domain. Most existing schemes for authentication and cluster key management for external users, exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster head. This increase communication cost and delay in such real time access information. To handle this critical issue in cluster wireless mobile sensor network, we propose a lightweight authentication and key management scheme using a fuzzy extractor. In this scheme, any external user can access data directly from the cluster head of any cluster without the involvement of the base station. The proposed scheme only uses the one-way hash functions and bitwise XOR operations, apart from the fuzzy extractor method for the user biometric verification at the login phase. The presented scheme supports scalability for an increasing number of nodes using polynomials. The proposed scheme increases the life-time of the network by decreasing the key pool size.

Highlights

  • The most recent innovative advances in Multi-Electro-Mechanical Systems (MEMS) have empowered the improvement of scaled-down sensor nodes [1]

  • One of the strong aspects of the proposed scheme is that it is based on a lightweight one-way hash function and bit-wise XOR operation as well as using fuzzy extractor technique which is only required for biometric verification of external users

  • The external users EUi registered in the network for accessing real-time data from particular CHi for providing relief to this region without the involvement of BS during the authentication process

Read more

Summary

Introduction

The most recent innovative advances in Multi-Electro-Mechanical Systems (MEMS) have empowered the improvement of scaled-down sensor nodes [1]. The given structure shown, assumes an external user who went access the real-time information from the cluster head directly instead of a base station. Secure lightweight authentication and key management scheme need to be designed for WMSN, which should be efficient communicationally and computationally for an external user, sensor nodes, and base station [4]. On the premise of the received information from the specific cluster head, the external user can take a significant choice, for example, the driver of the rescue vehicle can pick the correct run time path which has fewer blockages to help that driver to spare the life of a patient This requires designing an efficient external user authentication and key management scheme for providing real-time access in WMSN.

Literature Review
Threat and System Models
Preliminaries
Proposed Scheme
External User Registration
Dynamic Key Management
Security Analysis
Result and Discussions
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call