LoENA: Low-overhead encryption based node authentication in WSN

Nodes in a wireless sensor network (WSN) are susceptible to various attacks primarily due to their nature of deployment and unguarded communication. Therefore, providing security in such networks is of utmost importance. The main challenge to achieve this is to make the security solution light weight so that it is feasible to implement in such resource constrained nodes in WSN. So far, data authentication has drawn more attention than the node authentication in WSN. A robust security solution for such networks must also facilitate node authentication. In this paper, a low overhead encryption based security solution is proposed for node authentication. The proposed node authentication scheme at the sender side consists of three modules viz. dynamic key generation, encryption and embedding of key hint. Performance of the scheme is primarily analyzed by using two suitably chosen parameters such as cracking probability and cracking time. This evaluation guides us in fixing the size of the unique id of a node so that the scheme incurs low-overhead as well as achieves acceptable robustness. The performance is also compared with a couple of recent works in terms of computation and communication overheads and that confirms our scheme's supremacy over competing schemes in terms of both the metrics.

[1]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[2]  Sajal K. Das,et al.  Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .

[3]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[4]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[5]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[6]  Xiaohua Li,et al.  An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[7]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[8]  Xuehai Zhou,et al.  Distributed Node Authentication in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[10]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[11]  Sipra Das Bit,et al.  A dynamic TDMA based scheme for securing query processing in WSN , 2012, Wirel. Networks.

[12]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[13]  Sipra Das Bit,et al.  μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks , 2012, DPM/SETOP.

[14]  Liangmin Wang,et al.  Mobile node authentication protocol for crossing cluster in heterogeneous wireless sensor network , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[15]  Yu-Jung Huang,et al.  Mutual Message Authentication Protocol in Wireless Sensor Networks , 2022 .

[16]  A. V. Sakhare,et al.  Efficient Sensor Node Authentication in Wireless Integrated Sensor Networks Using Virtual Certificate Authority , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[17]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[18]  Harsh K. Verma,et al.  Authentication Protocol for Wireless Sensor Networks , 2010 .