Preview

Wireless Sensor Network

Powerful Essays
Open Document
Open Document
15813 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Sensor Network
An Efficient Node Authentication Algorithm for Wireless Sensor Network Using
Public Key Cryptography and Hashing
(Simulation & Algorithm) Syed Osama Meraj Department of Computer Science Mohammad Ali Jinnah University dreamzunlimited81@hotmail.com Sir. Rizwan ur Rashid Mohammad Ali Jinnah University rizwan@jinnah.edu

1.Abstract:
The need for security in WSNs is unavoidable. Applications such as military, medical care, structural monitoring, and surveillance systems require information security in the network. As current security mechanisms for WSNs are not sufficient, development of new security schemes for WSNs is necessary. Nowadays research and applications of Wireless Sensor Network have attracted people’s attention. Since sensor nodes in WSN are resource-constrained, the security solutions for WSN become difficult. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages, data integrity verification which prevents modification of data from going undetected. Traditional security measures require heavy communication and computational resources and cryptographically complex security solutions for sensor networks are not suitable for WSN. In this paper, I have proposed an algorithm for node authentication by using cryptographic hash function and public key cryptography technique in Wireless Sensor Network .Which can fulfill confidential communication and mutual authentication between nodes, enhances scalability, node authentication security and prevents node impersonation.

2.Introduction:
Wireless sensor networks consist of a large number of such sensor nodes and are able to collect and disseminate data in areas where ordinary networks are unsuitable for environment. Wireless sensor networks use new technology and standards. They involve small, energy-efficient devices, hardware/software co-design, and



References: [1] KunZhang, Cuirong Wang “A new Group Key Management Scheme with Simple Hash Based Authentication for Wireless Sensor Networks” 2010 International Conference on Computer Design and applications (ICCDA 2010) IEEE 2010. [9] Chong & Kumar, 2003; Akyildiz, Su, Sankarasubramaniam & Cayirci, 2002; Culler, Estrin & Srivastava, 2004 [10] Garth V [20] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: securing sensor networks with public key technology," in Proc. ACM Workshop Security of Ad Hoc Sensor Networks, pp. 59-64, 2004. [24]“Adaptive Authentication Mechanism using Node Reputation on Mobile Medical Sensor Networks” Mihui Kim and Kijoon Chae Feb. 17-20, 2008 ICACT 2008 [25]”Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes” Keith M [26]”An Efficient Authentication Strategy for Reprogramming of Sensor Networks” Jin Tan, JinTan Chen, YanQiu Liu, 2007 International Conference on Computational Intelligence and Security, 2007 IEEE. [29] “Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks” Roberto Di Pietro · Luigi V. Mancini · Alessandro Mei, Wireless Netw (2006) 12:709–721 Springer.

You May Also Find These Documents Helpful

  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231-…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Assess and design proper authentication methods for RADIUS and TACACs+ authentication servers deployments as well as IEEE 802.11 WLAN infrastructures…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    wireshark

    • 452 Words
    • 3 Pages

    The project this week involved a deeper dive into the packet structure for the wireless protocol. Identifying the Authentication and Authorization was trickier than it appeared initially. Identifying the authentication and ciphers can come in handy when trying to identify an endpoint is not being allowed on the internet which is a frequent problem in a secure location.…

    • 452 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Radack, S. (n.d.), SECURITY FOR WIRELESS NETWORKS AND DEVICES, WIRELESS TECHNOLOGY AND SECURITY, retrieved from http://itl.nist.gov/lab/bulletns/bltnmar03.htm…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    War Driving

    • 1481 Words
    • 6 Pages

    With the technological advances in the way we transmit information over the past forty years have come new challenges for security experts. None of these challenges have been more complicated than that of securing information saved on a computer or a network of computers. It seems with every new security measure implemented to protect this information, there is someone who discovers a way of manipulating this new measure to gain access. One of the technological advances that have created a huge challenge for security specialists is the use of wireless internet connections.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    As much as it was both reactionary zeal and genuine concern, much of Great Britain's Parliament felt compelled to restrict certain civil liberties (such as freedom of assembly and speech) in order to preserve the greater peace and thus saving England from the fate of France's failed revolution, whose Reign of Terror inspired fear in many European countries around it. English aristocrats and the Monarchy were very concerned over the course of events in France and as such would go to great pains to suppress any "radical" thinking or publishing (that is, any logic that mirrored or even resembled the "equality" ideals that fostered the revolution). The impassioned rhetoric of Edmond Burke and William Putt, Prime minister of England put into motion laws that would not only limit free speech, but also free thought in regards to the French political movement. Intellectual discussions of certain revolutionary ideas were banned and the writ of habeas corpus was temporarily suspended in 1794. While poets like William Wordsworth might indeed have been inspired by the nationalistic spirit and ideas of equality that the French National Assembly (the governing body of France during the revolution) proposed, the bloody turn of events in the French Revolution and the rise of Napoleon led not only to a new rise in conservatism in Europe(particularly in Wordsworth himself, who later in life identified himself as a conservative), but to reactionary laws in England.…

    • 1260 Words
    • 5 Pages
    Good Essays
  • Best Essays

    1. School of Computer Science, China University of Geosciences, Wuhan 430074, China; 2. Shandong Provincial Key Laboratory of Computer Network, Jinan 250014, China; 3. Department of Computer Engineering, Naval University of Engineering, Wuhan 430033, China Abstract: Network coding can improve network efficiency by extending copy-and-forward paradigm to code-andforward paradigm. It thus imposes a security problem called pollution attack that some network coding or forwarding nodes may intentionally fabricate, modify, forge, or drop packets. Recently, many authentication methods are proposed to guarantee the correctness of encoding and forwarding results via the verification from receivers. Those methods include homomorphic hashing, homomorphic message authentication code, and homomorphic signature. However, those schemes result in expensive computation overhead due to the homomorphic cryptographic primitives, so that those methods will not be able to work in most applications that confront resource constraints. In this paper, we propose an ultra-lightweight checking protocol to guarantee the secure network coding without any homomorphic cryptographic primitives. The extensive analysis proofs that it has following advantages: the least security assumption for intermediate nodes, the least cryptographic primitive requirement, ultra-lightweight computation, flexible message length with probably proof, and minimal rounds in terms of message exchanging. Key words: covert network coding; security; pollution attack; secure protocol…

    • 5228 Words
    • 21 Pages
    Best Essays
  • Satisfactory Essays

    Syllabus of 8th Sem

    • 728 Words
    • 3 Pages

    2. Atul Kahate, ““Cryptography and Network Security”, Second Edition, Tata McGraw Hill Education Pvt. Ltd., New Delhi, 2009 3. William Stallings, “Cryptography and Network Security, fourth edition, Prentice Hall, New Delhi, 2006. REFERENCE BOOKS 1.…

    • 728 Words
    • 3 Pages
    Satisfactory Essays