Security for wireless sensor network

Security of wireless sensor networks plays an essential role in the application they used. Due to resource limitations of sensor node, such as energy supply and memory size, pairwise keys establishment between nodes are considered a difficult problem. This paper proposes a simple shared key discovery between sensor nodes in very clear steps. The authentication protocol provides both message and entity authentication. The work assumes dynamic wireless sensor network with flat structure. The performance of the proposed protocol will be shown in terms of message size, energy cost, and security requirements achieved.

[1]  Joonsang Baek,et al.  Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.

[2]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[3]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[4]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[5]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[6]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[7]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[8]  Mohammad Ilyas,et al.  Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[9]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[10]  Ashok Kumar Das A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge , 2011, ArXiv.

[11]  Leandros Tassiulas,et al.  Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing , 2013, ACM Interational Symposium on Mobile Ad Hoc Networking and Computing.

[12]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[13]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[14]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[15]  Imad Mahgoub,et al.  A Hierarchical Key Establishment Scheme forWireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).

[16]  Jon Crowcroft,et al.  Ticket based service access for the mobile user , 1997, MobiCom '97.

[17]  Armando Fox,et al.  Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.

[18]  K.S. Ramanatha,et al.  An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.

[19]  S.A. Khan,et al.  Analyzing & Enhancing energy Efficient Communication Protocol for Wireless Micro-sensor Networks , 2005, 2005 International Conference on Information and Communication Technologies.