Key Management Mechanism for Authentication Security in Wireless Sensor Network

Since the multi-user broadcast authentication protocol in current WSN cannot provide strong safety, perfect scalability and low energy consumption simultaneously. A certificatele ss key managing scheme based on identity is studied in this paper. The proposed method divides the broadcasting in WSN into two parts: users broadcasting and base station broadcasting. We also adopt different password schemes for system safety. At the user end, a short signature protocol is used for signature and authe ntication on the broadcasting packet to acquire scalability and low power consumption; at the base station end, partial message recovered Schnorr signature is adopted to protect its broadcasting. In additi on, we use the user private protecting scheme based on passwords to resist compromising attacks. Because our improved protocol is based on certificateless signature protocols, it avoids the key escrow problems compared to existing authentication protocols and acquires safety with higher level. The simulations show that the scheme has lowered the power consumption at least 40% without sacrifice in safet y and efficiency.

[1]  Jacques Stern,et al.  Signing on a Postcard , 2000, Financial Cryptography.

[2]  Qi Shi,et al.  Component-based security system (COMSEC) with QoS for wireless sensor networks , 2013, Secur. Commun. Networks.

[3]  Jonathan Loo,et al.  Intrusion Detection and Security Mechanisms for Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  Min Yoon,et al.  A Signature-Based Data Security Technique for Energy-Efficient Data Aggregation in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[6]  Yong-Min Liu,et al.  A Protocol Model for Wireless Sensor Network , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[7]  Jang-Ping Sheu,et al.  Boundary Node Selection and Target Detection in Wireless Sensor Network , 2007, 2007 IFIP International Conference on Wireless and Optical Communications Networks.

[8]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[9]  Chun Chen,et al.  Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2013, IEEE Transactions on Industrial Electronics.

[10]  Ramjee Prasad,et al.  Reliable and Secure Cooperative Communication for Wireless Sensor Networks Making Use of Cooperative Jamming with Physical Layer Security , 2013, Wirel. Pers. Commun..

[11]  Yong Yu,et al.  Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks , 2013, IEICE Trans. Inf. Syst..

[12]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[13]  Cheng-Chi Lee,et al.  An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks , 2013, Sensors.

[14]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.

[15]  P. Fortier,et al.  A comparison between different FHSS techniques for use in a multiple access secure wireless sensor network , 2006, 2006 IEEE Annual Wireless and Microwave Technology Conference.

[16]  Xinping Guan,et al.  Balance energy-efficient and real-time with reliable communication protocol for wireless sensor network , 2013 .

[17]  Da-Zhi Sun,et al.  On the security and improvement of a two-factor user authentication scheme in wireless sensor networks , 2012, Personal and Ubiquitous Computing.

[18]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[19]  Wenjing Lou,et al.  Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[20]  Cheng Hong-bing An Efficient Key Agreement Scheme for Wireless Sensor Networks , 2008 .

[21]  Qiaoyan Wen,et al.  Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.

[22]  Yunlong Zhu,et al.  A Multi-Layered Energy-Efficient and Delay-Reduced Chain-Based Data Gathering Protocol for Wireless Sensor Network , 2008, 2008 IEEE/ASME International Conference on Mechtronic and Embedded Systems and Applications.

[23]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[24]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[25]  Zhao Jing Research on Cloud Trust Model for Malicious Node Detection in Wireless Sensor Network , 2012 .

[26]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[27]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[28]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[29]  Tomotaka Wada,et al.  Effective Barrier Coverage Constructions for Improving Border Security in Wireless Sensor Networks , 2013, IEICE Trans. Commun..

[30]  Ma Chun-guang Survey on Identity-based Key Establishment Protocols for Wireless Sensor Networks , 2010 .

[31]  Zhang Xiao WSN's Key Questions and Its Military Applications , 2007 .

[32]  Xu Tian-wei Multi-layered energy-efficient and delay-reducing chain-based data gathering protocol for wireless sensor network , 2008 .

[33]  Wang Hui ABE-IBS based signature-encryption method for WSN , 2010 .