Abstract

Wireless sensor networks (WSNs) have been widely deployed in different application domains ranging between environment monitoring, transportation, target tracking, and health care. However, due to the limited power supply of the sensors, the researchers introduce mobile sinks in WSNs to prolong its lifetime. When introducing the mobile sinks in WSNs, the authentication issue between the mobile sink and the sensors appears. However, there are few studies on the authentication issue when using mobile sinks in WSNs. In this paper, we present a bilinear pairing based authentication and key agreement scheme for the authentication between mobile sinks and cluster head in WSNs. The proposed scheme can solve the problems of mobile sink authentication and provide data confidentiality and integrity. Security and performance analysis demonstrate that the proposed scheme can resist against various attacks and meet the requirements of computational complexity in the environment of WSNs.

Highlights

  • Wireless sensor networks (WSNs) consist of a few base stations (BS) and a large number of low-cost sensor nodes which have constrained communication and computation resources

  • To address the above-mentioned issue, in this paper, we propose an authentication scheme that provides authentication and session key agreement between mobile sink and cluster head (CH, a special kind of sensor nodes which play the role of the base station in each local cluster)

  • There are many studies focusing on the mobile sink, few works focus on the security problem when introducing the mobile sinks in WSNs

Read more

Summary

Introduction

Wireless sensor networks (WSNs) consist of a few base stations (BS) and a large number of low-cost sensor nodes which have constrained communication and computation resources. Almost all of the existing schemes focus on the mobility strategies of the mobile sink and few studies mentioned the security issues of using mobile sink in the resource-constrained WSNs. almost all of the existing schemes focus on the mobility strategies of the mobile sink and few studies mentioned the security issues of using mobile sink in the resource-constrained WSNs In some scenarios, such as military target tracking and biomedical health monitoring, sensor nodes need to transmit confidential data via the wireless networks. International Journal of Distributed Sensor Networks communication entities (the user, the sensors, and the base station) to exchange message for verifying each other in WSNs. the proposed scheme is more flexible than three-communication-entity based authentication scheme when using mobile sinks in WSNs. The remainder of this paper is organized as follows.

Related Work
The Proposed Scheme
Security Analysis and Performance Evaluation
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call