MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks

Wireless sensor networks (WSNs) is an infrastructure free organization of various operational devices. Due to their overwhelming characteristics, these networks are used in different applications. For WSNs, it is necessary to collect real time and precise data as critical decisions are based on these readings in different application scenarios. In WSNs, authentication of the operational devices is one the challenge issue to the research community as these networks are dynamic and self-organizing in nature. Moreover, due to the constraint oriented nature of these devices a generalized light-weight authentication scheme is needed to be developed. In this paper, a light-weight anonymous authentication techniques is presented to resolve the black-hole attack issue associated with WSNs. In this scheme, Medium Access Control (Mac) address is used to register every node in WSNs with its nearest cluster head (CH) or base station module(s). The registration process is performed in an off-line phase to ensure authenticity of both legitimate nodes and base stations in an operational network. The proposed technique resolves the black-hole attack issue as an intruder node needs to be registered with both gateway and neighbouring nodes which is not possible. Moreover, a hybrid data encryption scheme, elliptic curve integrated encryption standard (ECIES) and elliptic curve deffi-hellman problem (ECDDHP), is used to improve authenticity, confidentiality and integrity of the collected data. Simulation results show the exceptional performance of the proposed scheme against field proven techniques in terms of minimum possible end-to-end delay & communication cost, maximum average packet delivery ratio and throughput in presence of malicious node(s).

[1]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[2]  B. Karthikeyan,et al.  Security Improved Ad-Hoc on Demand Distance Vector Routing Protocol (SIm AODV) , 2016 .

[3]  H. T. Mouftah,et al.  Improved two-factor user authentication in wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[4]  J. K. Mandal,et al.  QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack , 2013 .

[5]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[6]  Yanxiao Zhao,et al.  An Effective AODV-based Flooding Detection and Prevention for Smart Meter Network , 2017, IIKI.

[7]  Monther Aldwairi,et al.  An Enhanced AODV Protocol for Avoiding Black Holes in MANET , 2018, FNC/MobiSPC.

[8]  Ankur Gupta,et al.  A lightweight anonymous user authentication and key establishment scheme for wearable devices , 2019, Comput. Networks.

[9]  Peter J. B. King,et al.  AODV and SAODV under Attack: Performance Comparison , 2014, ADHOC-NOW.

[10]  Mahouton Norbert Hounkonnou,et al.  Black Hole Attack Prevention in Wireless Peer-to-Peer Networks: A New Strategy , 2018, Int. J. Wirel. Inf. Networks.

[11]  Hossam Diab,et al.  BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map , 2019, IEEE Access.

[12]  Jiguo Li,et al.  Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage , 2018, IEEE Transactions on Services Computing.

[13]  Lu Lu,et al.  Analysis on the Principles of Congestion Charging Policy and Study on the Decision-Making Model , 2016 .

[14]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[15]  Mahdieh Ghazvini,et al.  A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2015, Wireless Networks.

[16]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[17]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[18]  Peilin Hong,et al.  Distributed access control with adaptive privacy preserving property for wireless sensor networks , 2014, Secur. Commun. Networks.

[19]  Laura Galluccio,et al.  SD-WISE: A Software-Defined WIreless SEnsor network , 2017, Comput. Networks.

[20]  Ruhul Amin,et al.  A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.

[21]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[22]  Adwan Yasin,et al.  Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique , 2018, Wirel. Commun. Mob. Comput..

[23]  Prosanta Gope,et al.  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.

[24]  Mohammad Ali Jabraeil Jamali,et al.  EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs , 2019, J. Ambient Intell. Humaniz. Comput..

[25]  Ashok Kumar Das,et al.  Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.

[26]  Jiri Hosek,et al.  On perspective of security and privacy-preserving solutions in the internet of things , 2016, Comput. Networks.

[27]  Giancarlo Fortino,et al.  Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks , 2019, IEEE Access.

[28]  Mohsen Guizani,et al.  SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications , 2019, International Journal of Information Security.