Abstract Using wireless sensor nodes in military operations reduces risks and improves the efficiency of operations, and above all, it minimizes causalities by a large number. Security of sensor nodes is vital and crucial in their deployment and usage in military operations. Verifying the authenticity of sensor nodes is the most desired requirement in applications of wireless sensor networks (WSNs) such as in military to resist various attacks, i.e. replay attack, impersonation attack, ensure forward secrecy and backward secrecy; to reduce the computational and communicational overheads and less consumption of battery power. Here, we propose an efficient and secure authentication protocol for WSNs with context to military applications. Customized digital certificate is used for proving the legitimacy of the sensor nodes. In WSNs, a node is preloaded with the base station’s public key at the time of deployment; it requests and acquires its certificate from the base station and is later used for mutual authentication by sensor nodes. Here, the digital certificate generated and later used by nodes, is customized according to the requirements of military applications. This protocol achieves different security requirements with low computational and communicational overheads. The formal and automated security analysis has been done and proved that the protocol is safe and secure from potential security attacks.
[1]
Chin-Ling Chen,et al.
Dynamic Session-Key Generation for Wireless Sensor Networks
,
2008,
EURASIP J. Wirel. Commun. Netw..
[2]
David E. Culler,et al.
SPINS: Security Protocols for Sensor Networks
,
2001,
MobiCom '01.
[3]
Muzzammil Hussain,et al.
Simple, Secure, Efficient, Lightweight and Token Based Protocol for Mutual Authentication in Wireless Sensor Networks
,
2015
.
[4]
Ismail Mansour,et al.
Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks
,
2014,
J. Sens. Actuator Networks.
[5]
Yang Xiao,et al.
Secure data aggregation in wireless sensor networks: A comprehensive overview
,
2009,
Comput. Networks.
[6]
Ian F. Akyildiz,et al.
Wireless sensor networks: a survey
,
2002,
Comput. Networks.
[7]
Hsin-Wen Wei,et al.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
,
2011,
Sensors.
[8]
Taeshik Shon,et al.
Sensor Authentication in Dynamic Wireless Sensor Network Environments
,
2012
.