Analysis and Improvements of a Light-weight Authentication Scheme for Wireless Sensor Networks

Now, security plays an important role in wireless sensor networks architecture. Dr. Oscar proposed a light-weight authentication scheme for wireless sensor networks. In this paper, we show that there are some security flaws in Oscar’s light-weight authentication scheme: an attacker and a sensor node can collude to make the attacker join in the wireless sensor network, the sensor node cannot resist the DOS attacks via using other illegitimate sensor nodes and encryption keys of the sensor nodes can be obtained by capturing the node. To fix these problems, we present some improvements. These cannot only solve the above security flaws in Oscar’s scheme, but also only make slight effect in the efficiency, security and other features of the Oscar’s scheme.

[1]  Philippe Flajolet,et al.  Random Mapping Statistics , 1990, EUROCRYPT.

[2]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[3]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[6]  Ingrid Verbauwhede,et al.  Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.

[7]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[8]  Ingrid Verbauwhede,et al.  Reducing radio energy consumption of key management protocols for wireless sensor networks , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).

[9]  Javier López,et al.  Unleashing public-key cryptography in wireless sensor networks , 2006, J. Comput. Secur..

[10]  Qijun Gu,et al.  Analysis of area-congestion-based DDoS attacks in ad hoc networks , 2007, Ad Hoc Networks.

[11]  G. Clark,et al.  Reference , 2008 .

[12]  Rongbo Zhu Efficient Fault-Tolerant Event Query Algorithm in Distributed Wireless Sensor Networks , 2010, Int. J. Distributed Sens. Networks.

[13]  Chin-Chen Chang,et al.  An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[14]  Guomin Yang Comments on "An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks" , 2011, IEEE Trans. Wirel. Commun..

[15]  José María Sierra,et al.  A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.

[16]  Rongbo Zhu,et al.  Energy-Aware Distributed Intelligent Data Gathering Algorithm in Wireless Sensor Networks , 2011, Int. J. Distributed Sens. Networks.

[17]  Xinqiang Chen,et al.  Building a WSN Based Internet-of-ships for Inland Shipping , 2012 .

[18]  Cheng Fenhua A Distributed Dynamic Pairwise Key Establishment Scheme for Wireless Sensor Networks , 2012 .

[19]  Rongbo Zhu Intelligent Collaborative Event Query Algorithm in Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[20]  Lin yong Research of the Communication Distance-aware Multipath AODV Routing Protocol for Wireless Sensor Networks , 2012 .

[21]  Ling Yun Research on Wireless Sensor Network Mobile Route Positioning Security , 2012 .

[22]  Liu Qiumei,et al.  Energy-Efficient Topology Evolution for Scale-free Wireless Sensor Networks , 2012 .