Abstract

Wireless sensor networks (WSNs) is an infrastructure free organization of various operational devices. Due to their overwhelming characteristics, these networks are used in different applications. For WSNs, it is necessary to collect real time and precise data as critical decisions are based on these readings in different application scenarios. In WSNs, authentication of the operational devices is one the challenge issue to the research community as these networks are dynamic and self-organizing in nature. Moreover, due to the constraint oriented nature of these devices a generalized light-weight authentication scheme is needed to be developed. In this paper, a light-weight anonymous authentication techniques is presented to resolve the black-hole attack issue associated with WSNs. In this scheme, Medium Access Control (Mac) address is used to register every node in WSNs with its nearest cluster head (CH) or base station module(s). The registration process is performed in an off-line phase to ensure authenticity of both legitimate nodes and base stations in an operational network. The proposed technique resolves the black-hole attack issue as an intruder node needs to be registered with both gateway and neighbouring nodes which is not possible. Moreover, a hybrid data encryption scheme, elliptic curve integrated encryption standard (ECIES) and elliptic curve deffi-hellman problem (ECDDHP), is used to improve authenticity, confidentiality and integrity of the collected data. Simulation results show the exceptional performance of the proposed scheme against field proven techniques in terms of minimum possible end-to-end delay & communication cost, maximum average packet delivery ratio and throughput in presence of malicious node(s).

Highlights

  • Wireless sensor networks (WSNs) play a vital role in automating and upgrading different parts of our daily life activities such as patients diagnosis, smart homes or offices, parking, safety and security measures etc

  • In WSNs, data collected by sensor boards, which consists of confidential and sensitive information, is transmitted to a central location, The associate editor coordinating the review of this manuscript and approving it for publication was Kaiping Xue

  • Authentication of operational devices in WSNs is a primitive process which is used to verify the identity of both sender and receiver modules

Read more

Summary

Introduction

Wireless sensor networks (WSNs) play a vital role in automating and upgrading different parts of our daily life activities such as patients diagnosis, smart homes or offices, parking, safety and security measures etc. In WSNs, data collected by sensor boards, which consists of confidential and sensitive information, is transmitted to a central location, The associate editor coordinating the review of this manuscript and approving it for publication was Kaiping Xue. i.e., gateway or server, through either direct or multi-hop communication mechanism [3]. I.e., gateway or server, through either direct or multi-hop communication mechanism [3] This sensitive data needs to be collected and accessed solely by authenticated device(s) in an operational network. In WSNs, Sensor boards or devices are limited in terms of processing, communication, power and sensing capabilities

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.