Mobile node authentication protocol for crossing cluster in heterogeneous wireless sensor network

The introduction of mobile node brings new security problems and challenges to Heterogeneous Wireless Sensor Network(HWSN), that is how to ensure the credibility, security and low consumption of mobile node in the entire network. In this paper, we design a highly efficient re-authentication protocol for mobile node (MRAP) in HWSN, which makes two communicating parties achieve identity authentication and establish a new pairwise key. We analyze our re-authentication according to the theory. The result shows that our authentication protocol does not affect HWSN performance basically, besides it can provide better security with reducing communication overhead, computation cost and storage space than previous protocols.

[1]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[2]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[3]  Howon Kim,et al.  Implementation of TinyHash based on Hash Algorithm for Sensor Network , 2007 .

[4]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[5]  Imad Mahgoub,et al.  A Hierarchical Key Establishment Scheme forWireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).

[6]  Kwangjo Kim,et al.  Untraceable Mobile Node Authentication in WSN , 2010, Sensors.

[7]  S. Howell,et al.  Methylglyoxal Can Modify GAPDH Activity and Structure , 2005, Annals of the New York Academy of Sciences.

[8]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[9]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[10]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[11]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[12]  Firdous Kausar,et al.  An efficient key distribution scheme for heterogeneous sensor networks , 2007, IWCMC.

[13]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[14]  Claudio Soriente,et al.  Collaborative authentication in unattended WSNs , 2009, WiSec '09.

[15]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[16]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.