Abstract
Wireless sensor networks (WSNs) contain a large number of resource-constrained and energy-limited sensor nodes that are generally deployed in an open environment. Those sensor nodes communicate with each other or with a base station via wireless channels. Therefore, secure access control is an important issue in WSNs because sensor nodes are susceptible to various malicious attacks during the authentication and key establishment phase and the new node addition phase. In this study, we propose a new access control method based on elliptic curve cryptography and the chameleon hash function. This method addresses the security problems in the existing research. It also has additional advantages since it does not require time synchronization between communication nodes, nor does it require node verification tables. In addition to our proposal, the correctness, security, resistance to possible attacks, and the performance of the proposed method are analyzed and evaluated. The results of our study demonstrate that the proposed method has an outstanding performance and fulfills all the requirements for secure communication in WSNs.
Highlights
Wireless sensor networks (WSNs) consist of base stations and a large number of resource-constrained and energy-limited sensor nodes that are typically deployed in various environments
Since the base stations and sensor nodes communicate with each other via wireless channels [1], the WSN system is threatened by malicious security attacks
Following the addition of a node, the new node is authenticated by the neighboring nodes, and it establishes shared session keys with them for secure communication
Summary
Wireless sensor networks (WSNs) consist of base stations and a large number of resource-constrained and energy-limited sensor nodes that are typically deployed in various environments. Huang [3] proposed an efficient access control protocol based on the elliptic curve and hash chains This scheme could add new nodes and resist various attacks. Their research indicated that the method proposed by Huang could not resist replay as well as active attacks It lacked hash chain renewability after the authentication and key establishment phase. In 2012, Lee et al [7] proposed a practical access control scheme, still based on elliptic curve and hash chain Such a large number of key distribution schemes [2–7] are vulnerable to various. The idea of proposed scheme based on the chameleon hash function [9–12] and Diffie-Hellman key agreement This proposed method can dynamically and securely add new nodes to the existing networks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Distributed Sensor Networks
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.