Abstract

In recent years, the adaptation of wireless sensor networks (WSNs) to application areas requiring mobility increased the security threats against confidentiality, integrity, and privacy of the information as well as against their connectivity. Since key management plays an important role in securing both information and connectivity, a proper authentication and key management scheme is required in mobility enabled applications where the authentication of a node with the network is a critical issue. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several mobile sensor nodes and a few fixed sensor nodes. We analyze our proposed solution by using the OMNET++ simulator to show that it requires less memory space and provides better connectivity and network resilience against node capture attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.

Highlights

  • The wireless sensor network (WSN) was initially considered to be used for military applications but the popularity of wireless sensor networks (WSNs), because of its small size, low cost, and being easy to deploy and manage, makes it used in a variety of applications

  • From the security point of view, sensor nodes are allowed to communicate only after being authenticated by the network and having established a communication key with the peer node. In this proposed network architecture, the base station and the fixed nodes are more powerful than mobile nodes, given the responsibility to play an important role in the authentication and key management

  • We proposed a new authentication and key management scheme for heterogeneous sensor networks including mobile nodes

Read more

Summary

Introduction

The wireless sensor network (WSN) was initially considered to be used for military applications but the popularity of WSN, because of its small size, low cost, and being easy to deploy and manage, makes it used in a variety of applications. To secure the network operation and securely gather and forward the information, security threats and their countermeasures should be considered at design time in terms of both requirements and implementation techniques Such tasks are not trivial due to the limited energy, computation, memory, and bandwidth resources available in sensor nodes. To achieve better performance and scalability, H-sensors have more resources in terms of energy, computation power, storage capacity, and transmission power, and so forth compared to L-sensors Both H-Sensors and L-sensors are still highly vulnerable in nature and are exposed to several security threats and prone to physical attacks. A key management scheme for heterogeneous wireless sensor network is proposed to overcome the scalability issues by providing almost 100% network connectivity, reducing memory cost while increasing the network resilience against attacks, and reducing communication overhead to save the energy and increase of network lifetime.

Related Work
Proposed Scheme
Performance Evaluation
Security Evaluation
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.