HySecNJoining: A hybrid secure node joining algorithm for wireless sensor network

A wireless sensor network consists of several sensor nodes strewn over a large geographic area and base station. Depending upon the routing model used data collected by the sensor node are routed through several hops of the network to the base station. Before a new node becomes operational the base station verifies its authenticity for security reasons. We call this phase as secure joining of a node. The process of secure joining can be as simple as allowing a new node to join by simply verifying its MAC-ID in plain text. However, this simple secure joining is prone to many attacks and therefore, not acceptable to many organizations requiring high grade of security. On the other hand stringent process of secure joining such as multi-level verification of authentication credentials in a secure channel comes with a cost in terms of energy consumption. In this paper we propose a stringent secure joining method which uses the concept of certificate less PKI and symmetric key and goes through multi-level authentication for prevention of flooding attack.

[1]  Young-Joo Kim,et al.  SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[2]  Avijit Kar,et al.  A NEW ALGORITHM FOR END TO END SECURITY OF DATA IN A SECURE SELF ORGANIZED WIRELESS SENSOR NETWORK , 2010 .

[3]  Falko Dressler,et al.  Self-Organization in Ad Hoc Networks: Overview and Classification , 2006 .

[4]  A. Jain,et al.  Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[5]  Stefan Rainer,et al.  Security versus Power Consumption in Wireless Sensor Networks , 2006 .

[6]  Lang Wei Research on the Security in Wireless Sensor Network , 2005 .

[7]  William J. Kaiser,et al.  Methods for scalable self-assembly of ad hoc wireless sensor networks , 2004, IEEE Transactions on Mobile Computing.

[8]  Avijit Kar,et al.  Key management in secure self organized wireless sensor network: a new approach , 2011, ICWET.

[9]  Choong Seon Hong,et al.  An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks , 2008, KSII Trans. Internet Inf. Syst..

[10]  Joongseok Park,et al.  Maximum Lifetime Routing In Wireless Sensor Networks ∗ , 2005 .

[11]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[12]  Dirk Westhoff,et al.  Security Solutions for Wireless Sensor Networks , 2006 .

[13]  Todd M. Austin,et al.  Fault-based attack of RSA authentication , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).

[14]  Sandeep K. S. Gupta,et al.  Role-based hierarchical self organization for wireless ad hoc sensor networks , 2003, WSNA '03.

[15]  Peter I. Corke,et al.  secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.

[16]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[17]  Charles E. Taylor,et al.  Self-organization in sensor networks , 2004, J. Parallel Distributed Comput..

[18]  Joel Weise-Sunps,et al.  Public Key Infrastructure Overview , 2001 .

[19]  Georg Lukas,et al.  WMNSec: security for wireless mesh networks , 2009, IWCMC.

[20]  Lewis Girod,et al.  Scalable Self-Assembly for Ad Hoc Wireless Sensor Networks , 2002 .

[21]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[22]  Hemanta Kumar Kalita,et al.  Secure self organization of wireless sensor network: A new approach , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).