A Privacy Preserving Security Protocol-Based Application for Wireless Communication System

The evolution of digital communication era includes both devices and applications running on different platforms. Specifics applications are needed for a safeguard communication ensuring protection and trust services to the users. The growing need to address privacy concerns when social network data is released for mining purposes has recently led to considerable interest in various network security-based applications. This paper presents a privacy preservation security protocol-based that enabling mutual authentication procedure between involved entities. This scheme provides specific security standards such as data integrity, message confidentiality and session key establishment to ensure security and privacy of both data and network. An extensive analysis shows that the proposed scheme achieves efficiency and can be safeguard to real wireless communication applications. Finally, a performance evaluation and comparison shows that our proposed framework is lightweight and resilient to various kinds of attacks.

[1]  Sungyoung Lee,et al.  An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.

[2]  Peng Gong,et al.  A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2013, Int. J. Distributed Sens. Networks.

[3]  Bruce Schneier,et al.  Analysis of the SSL 3.0 protocol , 1996 .

[4]  Joonsang Baek,et al.  Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.

[5]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[6]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[7]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[8]  Pardeep Kumar,et al.  E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks , 2012, Sensors.

[9]  Sipra Das Bit,et al.  A lightweight security scheme for query processing in clustered wireless sensor networks , 2015, Comput. Electr. Eng..

[10]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[11]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..

[12]  Mohsen Guizani,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[13]  Jong Hyuk Park,et al.  User authentication schemes with pseudonymity for ubiquitous sensor network in NGN , 2010, Int. J. Commun. Syst..

[14]  Hovav Shacham,et al.  When private keys are public: results from the 2008 Debian OpenSSL vulnerability , 2009, IMC '09.

[15]  Chun Chen,et al.  Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2013, IEEE Transactions on Industrial Electronics.

[16]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[17]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[18]  Vitaly Shmatikov,et al.  The most dangerous code in the world: validating SSL certificates in non-browser software , 2012, CCS.

[19]  Neeraj Kumar,et al.  A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[20]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[21]  Johann Großschädl,et al.  The energy cost of cryptographic key establishment in wireless sensor networks , 2007, ASIACCS '07.