Mutual authentication architecture in wireless sensor networks

Wireless sensor network (WSN, Wireless Sensor Network) is a kind of autonomous network with sensor nodes. It is different from traditional RFID system that the WSN is through the distribution of sensor nodes in different locations to monitor environmental conditions. The collected data from sensor nodes were sent back to the base station for further analysis and processing to compensate the shortage of traditional RFID system. Because the WSN itself transmit messages through the wireless communication media, the attacker can access to make anonymous connections or speculation sent the message is vulnerable to eavesdropping, interception and tampering. It is therefore very important to protect the confidentiality of information and privacy for WSN network. To enhance the security and privacy, a proposed mask function is used to establish mutual authentication protocol for WSN application. The simulation results of the proposed mutual authentication protocol are presented. The hardware verification of the proposed mask function is demonstrated on Altera DE2 demo board.

[1]  Lee-Chun Ko,et al.  A novel dynamic user authentication scheme for wireless sensor networks , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.

[2]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[3]  Yu-Jung Huang,et al.  Hardware Implementation of RFID Mutual Authentication Protocol , 2010, IEEE Transactions on Industrial Electronics.

[4]  Felix C. Freiling,et al.  User Authentication in Sensor Networks , 2004, GI Jahrestagung.

[5]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[6]  Sukumar Nandi,et al.  Defense against outside attacks in wireless sensor networks , 2008, Comput. Commun..

[7]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[8]  Srdjan Capkun,et al.  Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels , 2006, IEEE Transactions on Dependable and Secure Computing.

[9]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[10]  Zinaida Benenson,et al.  User authentication in sensor networks (extended abstract) , 2004 .

[11]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .