Back to Search
Start Over
An Authentication Protocol for Future Sensor Networks
- Source :
- Sensors; Volume 17; Issue 5; Pages: 979, Sensors (Basel, Switzerland), SENSORS(17): 5
- Publication Year :
- 2017
- Publisher :
- Multidisciplinary Digital Publishing Institute, 2017.
-
Abstract
- Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.<br />Comment: This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figures
- Subjects :
- FOS: Computer and information sciences
Computer Science - Cryptography and Security
Computer science
K.4.2
02 engineering and technology
privacy
K.6.m
01 natural sciences
Biochemistry
Article
94A62, 94A60, 68P25, 68M12, 68M14, 68M10, 14G50
Analytical Chemistry
Computer Science - Networking and Internet Architecture
C.2.2
Base station
C.2.0
sensor networks
K.6.5
C.2.4
network security
0202 electrical engineering, electronic engineering, information engineering
Electrical and Electronic Engineering
Instrumentation
Key exchange
Networking and Internet Architecture (cs.NI)
Authentication
business.industry
Node (networking)
010401 analytical chemistry
D.4.6
020206 networking & telecommunications
Atomic and Molecular Physics, and Optics
BAN logic
0104 chemical sciences
authentication
key distribution
Authentication protocol
Sensor node
Ticket
business
Cryptography and Security (cs.CR)
Wireless sensor network
Computer network
Subjects
Details
- Language :
- English
- ISSN :
- 14248220
- Database :
- OpenAIRE
- Journal :
- Sensors; Volume 17; Issue 5; Pages: 979
- Accession number :
- edsair.doi.dedup.....473ae0e69886be92b29128402525accd
- Full Text :
- https://doi.org/10.3390/s17050979