Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks

Wireless sensor networks (WSN) are being used worldwide in many areas. As the application areas of the WSN are increasing at the same rate the security threats are also increasing. Intruders are applying various mechanisms to access the sensible and confidential data from sensors. Hence, strong security measures are much needed to immune WSNs from various attacks. Authentication is a security mechanism that protects WSNs from wide range of security attacks. In this paper, an authentication protocol is proposed to mutually authenticate sensor nodes in wireless sensor networks. The proposed protocol is based on tokens. Any node when deployed in WSN is embedded with base station's public key and through the corresponding cluster head; it requests and acquires its token for authentication from the base station. The generated token is light in weight and reduces much of computational, communicational and storage overheads. The proposed protocol is verified for its security both formally and automatically. The proposed protocol is proved to be secure by evaluation in BAN logic and found SAFE by AVISPA-a model checker tool for testing authentication protocol.

[1]  Dan M. Nessett,et al.  A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  Colin Boyd,et al.  On a Limitation of BAN Logic , 1994, EUROCRYPT.

[4]  Chin-Ling Chen,et al.  Dynamic Session-Key Generation for Wireless Sensor Networks , 2008, EURASIP J. Wirel. Commun. Netw..

[5]  Martina Zitterbart,et al.  Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.

[6]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[7]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[8]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[9]  Muzzammil Hussain,et al.  Simple, Secure, Efficient, Lightweight and Token Based Protocol for Mutual Authentication in Wireless Sensor Networks , 2015 .

[10]  Yohan Boichut,et al.  Using Animation to Improve Formal Specifications of Security Protocols , 2007 .

[11]  Vijay Varadharajan,et al.  A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks , 2010, MobiQuitous.

[12]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[13]  Ping Wang,et al.  Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks , 2014, Ad Hoc Networks.

[14]  Yue Wang,et al.  Security Analysis of the Kerberos Protocol Using BAN Logic , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[15]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[16]  Catherine A. Meadows,et al.  Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.