Efficient Message Authentication and Source Privacy in Wireless Sensor Networks (original) (raw)
Related papers
Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, our scheme can also provide message source privacy.
Survey on Message Authentication and Source Privacy in Wireless Sensor Networks
Message authentication is one of the most efficient ways to prevent unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). That's why, numerous message authentication proposals have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Many of them, however, have the restrictions of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. Wireless Sensor Networks (WSN) are being very popular day by day, however one of the main concern in WSN is its limited resources. One have to look to the resources to generate Message Authentication Code (MAC) keeping in mind the feasibility of method used for the sensor network at hand. This paper investigates different cryptographic approaches such as symmetric key cryptography and asymmetric key cryptography.
Hop By Hop Authentication for Source Intermediate Node Privacy Protection in Wireless Sensor Network
2014
The Internet Key-Exchange (IKE) protocols are the core cryptographic protocols to ensure Internet security, which specify key exchange mechanisms used to establish shared keys for use in the Internet Protocol Security (IPsec) standards. For key-exchange over the Internet, both security and privacy are desired. For this reason, many message authentication schemes have been established, created on both symmetric-key cryptosystems and public-key cryptosystems. But it has the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise spells. The proposed scheme is Signature and ID generation, which are used to provide high security to message passing in Internet. This proposed method is an efficient key management framework to ensure isolation of the compromised nodes. Each node will have individual signature, and each message passing between intermediate nodes have one key to authenticate. Message passing between each nodes have an authentication using signature and key. This effective method will give high secure to message passing other than existing methods in Internet.
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
Journal of Ambient Intelligence and Humanized Computing, 2020
Information security broadly refers to the state of protection against unsanctioned access to information or data, principally electronic or digital data. In today's world of modern technology, there is a need to design and develop security measures to protect information from various security risks and threats. Wireless Sensor Networks (WSNs) hold significant importance in this era of the technological world; as its wide range of applications are being used around the globe in almost every domain. WSNs are being deployed with several constraints and limitations, due to which deploying security mechanisms on such networks becomes a difficult task for the developers. This research work specifically targeted security issues in WSNs and hence subjected to provide authentication and data encryption in a novel manner for node-to-node communication. The proposed scheme not only provides security for the node to node communication network but also hoards memory space on nodes with the help of Elliptic Curve Digital Signature (ECDSA) cryptographic scheme to provide an appropriate mechanism for measuring key generation time, count of hello message and packet size. Furthermore, the Algorithm for Wireless Secure Communication (ASCW) also provides key management with acceptable key length. In addition to this, ASCW helps in securing the communication on node level which helps in securing the whole network in a better and efficient manner. ASCW also reduces the cost of risk and security threats on the network with the help of authentication mechanism. A physical testbed has designed based on devices and sensor motes according to the required specifications. The proposed solutions have evaluated in terms of key generation time, several hello message and size of data packets. Experimental results have indicated that ASCW is one of the suitable and a novel approach for securing data on nodes during communication in WSNs.
Authenticating messages in wireless sensor networks
2017 International Conference on Trends in Electronics and Informatics (ICEI), 2017
Unethical and illegal messages can be easily obstructed by suitably authenticating them; in wireless sensor networks (WSNs), it is imperative that such messages should not be redirected. WSNs are trivial, low rate, and low battery-operated nodes wherein interconnection among nodes occurs via wireless links in a location that is extremely harsh and limited with few resources. It has been observed that WSNs are mainly used in unsupervised locations; so, they are highly susceptible to stalkers. To overcome such problems, there have been various authentication methods that have been initiated that are based on symmetric and public key cryptography. Message authentication is one such method that decreases illegal attacks in WSNs. Nonetheless, the method suffers from problems like large computational operating cost, lack of flexibility to node attacks, and scalability. Therefore, to surmount these problems, we develop a system that is based on modified elliptic curve digital signature. We...
IJERT-Message Authentication And Source Privacy using ECC in WSN
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/message-authentication-and-source-privacy-using-ecc-in-wsn https://www.ijert.org/research/message-authentication-and-source-privacy-using-ecc-in-wsn-IJERTV3IS031125.pdf In order to thwart unauthorised and corrupted messages from being forwarded in wireless sensor networks (WSN) we can make use of message authentication which is very effective way. In this regard many symmetric and public key cryptographic systems have been developed which suffered in their own limitations. Recently developed polynomial-based scheme also reported the limitation in its threshold value, as number of messages to be transferred should not cross the threshold limit. In this paper we propose a scalable authentication scheme based on Elliptic Curve Cryptography (ECC).Here our scheme enables intermediate nodes authentication and does not suffer with any threshold limit problem also provide message source privacy.
SCALABLE MESSAGE AUTHENTICATION SCHEME BASED ON ECC IN WIRELESS SENSOR NETWORKS
IJRCAR, 2015
Message Authentication scheme have been proposed in the past for protecting communication Authenticity and integrity in Wireless Sensor Networks (WSNs). For this reason, many Message Authentication schemes have been developed, based on either Symmetric-Key Cryptosystems or Public-Key Cryptosystems. While Symmetric Key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may create large memory and communication overhead. On the contrary, Public Key based Schemes have simple and clean key management. Most of them however have following limitations: Computation and Communication overhead, no resilience to a large number of node compromises, lack of scalability. To solve this problem, a secret Polynomial based Message Authentication scheme was introduced. This scheme is similar to a threshold secret sharing, where the threshold value is determined by the Degree of the Polynomial. When the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial and the system is completely broken. In this paper, we propose a Novel and efficient Source Anonymous Message Authentication scheme based on ECC to provide message content authenticity. To provide hop by hop message authentication without the weakness of the built in threshold of the polynomial based scheme. The main challenges is that authenticity must be guaranteed even when only the sender of the data is trusted and scheme needs to scale to potentially millions of receivers. Proposed scheme is more efficient than the polynomial-based scheme in terms of computational overhead, delivery ratio and message delay
Elliptic Curve Cryptography (ECC) for Security in wireless Sensor Network
2012
This paper discusses different issues of Wireless S ensor Network (WS N) and the relevance of the Elliptic curve y cryptography. S ecurity in WS N is a greater challenge in WS N due to the processing limitations of sensor nodes and nature of wireless links. Extensive use of WS Ns is giving rise to different types of threats. To defend against the threats proper security schemes are required. Traditionally security is implemented through hardware or software and is generally achieved through cryptographic methods. Limited area, nature of links, limited processing, power and memory of WS Ns leads to strict constraints on the selection of cryptographic techniques. Elliptic Curve Cryptography (ECC) is the best candidate due to its smaller key size. High security despite of smaller key size results in area and power efficient crypto systems.
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
The secured exchange of message was the main concern. To overcome this, message authentication schemes were developed, to maintain the privacy of message. Message authentication schemes are based on symmetric key or public key cryptosystem. This resulted in lack of scalability, delayed authentication, communication overhead, high computation, etc. To address these issues we propose a new system called Secured Authentication and Source Privacy (SASP) for Message based on Elliptic curve cryptography (ECC). This scheme adopts Polynomial-based technique for the elimination of computational overhead, increasing the scalability, fastening the authentication and exchange of unlimited number of messages. This analysis and simulation depending on our proposed system is far more efficient than previously existing Source Anonymous Message Authentication (SAMA) in terms of computation and communication overhead and also provides high level of security and source privacy.
An efficient approach for secured communication in wireless sensor networks
International Journal of Electrical and Computer Engineering (IJECE), 2020
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.