Secure Authentication Technique in Wireless Integrated Sensor Network: Virtual Certificate Authority

Wireless sensor network wireless sensor networks are continuously growing, so does the need for effective security mechanisms. WSN consists of large number of Sensor Nodes (SN). During the transmission of data from one node to another node, different security techniques are used. But the Wireless Sensor Networks are very difficult to secure due to its mobility. So that to analyze the security issues that arise try to solve by integrating Wireless Sensor Networks (WSN) with the mobile network. This is enabling us to experience variety of applications based on multi-sensor attached mobile network. The enhanced security procedures are operated through the mobile network in order to maximize the lifetime of the sensor networks and to apply the combined capabilities of both networks. This paper presents such mechanism to provide security for the data while allowing a sensor node to move across multiple WSNs. The proposed key management technique to provide secure authentication is by using Virtual Certificate Authority (VCA). It provides a solution to overcome the difficulties in securing the networks.

[1]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[2]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[3]  Michael Schukat,et al.  Authentication Using Virtual Certificate Authorities: A New Security Paradigm for Wireless Sensor Networks , 2010, 2010 Ninth IEEE International Symposium on Network Computing and Applications.

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  B. Paramasivan,et al.  Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview , 2011 .

[6]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[7]  Ofía,et al.  An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures Implementation and Evaluation , 2015 .

[9]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[10]  Rehana YASMIN,et al.  An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation , 2012, IEICE Trans. Inf. Syst..

[11]  Jong Hyuk Park,et al.  Efficient sensor node authentication in third generation-wireless sensor networks integrated networks , 2011, IET Commun..

[12]  Anil Kumar Verma,et al.  Security Frameworks for Wireless Sensor Networks-Review , 2012 .

[13]  Manjula M. Ramannavar,et al.  Authentication in Wireless Sensor Networks Using Virtual Certificate Authorities , 2012 .

[14]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[15]  M. Rameshkumar,et al.  Design an Enhanced Certificate Based Authentication Protocol for Wireless Sensor Networks , 2012 .

[16]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[17]  Theo Ungerer,et al.  SecSens - Security Architecture for Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.

[18]  Guilin Wang,et al.  An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.