Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks

R. Maidhili, G. Karthik
{"title":"Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks","authors":"R. Maidhili, G. Karthik","doi":"10.1109/ICCCI.2018.8441228","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSN) comprises of many clusters with sensor nodes. All the sensor nodes in the cluster joins together and dnamically broadcast the latest sensed data in the network. Due to the dispersed quality and forwarding nature of WSNs, they are almost used in all the real time applications for which multi user authentication is necessitous which can still lead to impersonation attacks (Attacker node act as legitimate node and sends bogus broadcast messages in the network). An Identity based scheme along with sink node is proposed in order to provide a secure broadcast authentication and minimizes the transmission rates and computation based on ECC (Elliptical Curve Cryptography). Initially the sink node generates public and private keys based on node ID using ECC and distributes the private key to the node in the network and public key to the user. The user encrypts and broadcast the control message using the public key to validate its authentication while the node decrypts the broadcast message using its private key provided by the sink. If the signature gets validated the node and the user will authenticate each other, else the connection will be refused which can prevent impersonation attack. In the attack scenario, if the attacker pretends to be a legitimate user and sends bogus broadcast messages, the attacker is dredged due to the mismatch that occurs while the signature is verified. This authentication scheme provides high security and daunts the attacker from the network. WSN consumes high energy during data transmission. To improvise the energy efficiency this project exploits low energy consumption MAC protocols. An energy-efficient data collection is done in WSNs by integrating IEEE 802.15.4/ZigBee standards in MAC layer. The main objective of the proposed work is to perform broadcast after authentication, to prevent resource consuming attacks through authentication and to reduce the energy wastage along with security in WSN communication.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI.2018.8441228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Wireless sensor networks (WSN) comprises of many clusters with sensor nodes. All the sensor nodes in the cluster joins together and dnamically broadcast the latest sensed data in the network. Due to the dispersed quality and forwarding nature of WSNs, they are almost used in all the real time applications for which multi user authentication is necessitous which can still lead to impersonation attacks (Attacker node act as legitimate node and sends bogus broadcast messages in the network). An Identity based scheme along with sink node is proposed in order to provide a secure broadcast authentication and minimizes the transmission rates and computation based on ECC (Elliptical Curve Cryptography). Initially the sink node generates public and private keys based on node ID using ECC and distributes the private key to the node in the network and public key to the user. The user encrypts and broadcast the control message using the public key to validate its authentication while the node decrypts the broadcast message using its private key provided by the sink. If the signature gets validated the node and the user will authenticate each other, else the connection will be refused which can prevent impersonation attack. In the attack scenario, if the attacker pretends to be a legitimate user and sends bogus broadcast messages, the attacker is dredged due to the mismatch that occurs while the signature is verified. This authentication scheme provides high security and daunts the attacker from the network. WSN consumes high energy during data transmission. To improvise the energy efficiency this project exploits low energy consumption MAC protocols. An energy-efficient data collection is done in WSNs by integrating IEEE 802.15.4/ZigBee standards in MAC layer. The main objective of the proposed work is to perform broadcast after authentication, to prevent resource consuming attacks through authentication and to reduce the energy wastage along with security in WSN communication.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线传感器网络中节能、安全的多用户广播认证方案
无线传感器网络(WSN)由许多具有传感器节点的集群组成。集群中的所有传感器节点连接在一起,并在网络中动态广播最新的感知数据。由于无线传感器网络的分散性和转发性,它几乎被用于所有需要多用户认证的实时应用中,但仍然可能导致冒充攻击(攻击者节点冒充合法节点,在网络中发送虚假广播消息)。为了提供安全的广播认证,并使传输速率和计算量最小化,提出了一种基于身份和汇聚节点的椭圆曲线加密方案。最初,汇聚节点通过ECC根据节点ID生成公私钥,并将私钥分发给网络中的节点,公钥分发给用户。用户使用公钥加密和广播控制消息以验证其身份验证,而节点使用接收器提供的私钥解密广播消息。如果签名得到验证,节点和用户将相互验证,否则连接将被拒绝,可以防止冒充攻击。在攻击场景中,如果攻击者冒充合法用户发送虚假的广播消息,则由于签名验证过程中出现的不匹配而疏通攻击者。该认证方案具有较高的安全性,并且可以阻止来自网络的攻击者。无线传感器网络在数据传输过程中消耗大量能量。为了提高能效,本项目采用了低能耗的MAC协议。通过在MAC层集成IEEE 802.15.4/ZigBee标准,实现无线传感器网络的节能数据采集。该工作的主要目标是在认证后进行广播,防止通过认证进行的资源消耗攻击,减少无线传感器网络通信中的能量浪费和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Critical review of machine learning approaches to apply big data analytics in DDoS forensics Detection of the effect of exercise on APG signals Categorisation of security threats for smart home appliances Rotation-based LTE downlink resource scheduling using queue status monitoring Design and Analysis of Booth Multiplier with Optimised Power Delay Product
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1