An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks

This paper proposes an efficient protocol for authentication and shared key establishment in hierarchical clustered wireless sensor networks. The protocol authenticates a source node to a base station, designates a cluster head to each authenticated source node and establishes shared keys between source node and the base station as well as with the cluster head. The above tasks are accomplished in a single step to reduce the required channel capacities. The protocol is implemented for TinyOS using NesC, simulated under TOSSIM and is viable for implementation in resource-constrained platforms like MICA. The security analysis shows that this protocol could withstand several possible attacks in the network

[1]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[2]  Hans Eberle,et al.  Energy Analysis of Public-Key Cryptography on Small Wireless Devices , 2004 .

[3]  David E. Culler,et al.  The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.

[4]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[7]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[8]  Tassos Dimitriou,et al.  Secure and Efficient In-Network Processing for Sensor Networks , 2004 .

[9]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[10]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[11]  Deborah Estrin,et al.  Building efficient wireless sensor networks with low-level naming , 2001, SOSP.

[12]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[13]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[14]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[15]  IntanagonwiwatChalermek,et al.  Building efficient wireless sensor networks with low-level naming , 2001 .