Study of Wireless Authentication Center with Mixed Encryption in WSN

WSN (wireless sensor network) has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center) with mixed encryption named “MEWAC” is proposed. MEWAC is based on MCU (Microcontroller Unit) and WiFi (Wireless Fidelity) module and uses RSA, AES (Advanced Encryption Standard), and SHA-1 (Secure Hash Algorithm 1) to provide high performance authentication and data encryption services for sensor nodes. The experimental results show that MEWAC has the advantages of low cost, low power consumption, good performance, and stability; moreover, the authentication protocol improves the security of WSN and reduces the overhead in node authentication.

[1]  Claudio Soriente,et al.  Collaborative authentication in unattended WSNs , 2009, WiSec '09.

[2]  Lu Yiqin,et al.  Design Of Embedded Web Server Based On MCU And IPv6 , 2013 .

[3]  Vincent Rijmen,et al.  The First 10 Years of Advanced Encryption , 2010, IEEE Security & Privacy.

[4]  Douglas R. Stinson,et al.  On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.

[5]  Mohamed Hamdi,et al.  A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[6]  Hyunyoung Lee,et al.  A Distributed Authentication Scheme for a Wireless Sensing System , 2005 .

[7]  Kwangjo Kim,et al.  Untraceable Mobile Node Authentication in WSN , 2010, Sensors.

[8]  Nael B. Abu-Ghazaleh,et al.  An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.

[9]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[10]  John Langford,et al.  Provably Secure Steganography , 2009, IEEE Trans. Computers.

[11]  Mircea Vladutiu,et al.  Secret data communication system using steganography, AES and RSA , 2011, 2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME).

[12]  A. Q. Zhao,et al.  Research on Dynamic Routing Mechanisms in Wireless Sensor Networks , 2014, TheScientificWorldJournal.

[13]  Ajay Kakkar,et al.  Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication in Multinode Network , 2012 .

[14]  Yongtae Shin,et al.  Implementation and performance analysis of AES-128 CBC algorithm in WSNs , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[15]  Lu Yiqin,et al.  Wireless authentication center based on embedded Wi-Fi technology , 2014 .

[16]  Qian Zhang,et al.  A Robust Entity Authentication in Wireless Sensor Networks , 2009, 2009 International Conference on Information Engineering and Computer Science.

[17]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.