Improved Authentication and Integrity Verification in Wireless Sensor Networks

International Journal of Computer Trends and Technology (IJCTT)          
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-6                           
Year of Publication : 2013
Authors :S.Sadakvalli , Ch.Suresh.babu


S.Sadakvalli , Ch.Suresh.babu"Improved Authentication and Integrity Verification in Wireless Sensor Networks"International Journal of Computer Trends and Technology (IJCTT),V5(6):275-280 November Issue 2013 .ISSN Published by Seventh Sense Research Group.

Abstract:- In an unprotected environment of Wireless Sensor Network, the authentication scheme for multicast secure communication has to be designed with limited usage of resources and computation. Wireless Sensor Network are diversified, several new issues such as mobility of sensor node are raised and bring security issues such as re-authentication and tracing the node movement. In the dynamic sensor network, mobile sensor nodes will continuously move around and frequently reconnect to other sensor nodes. While many security protocols to such networks occur significantly large overheads because their design only considered the static networks. Sensor nodes employ wireless communication in order to exchange data with their peers. Cryptography plays an important role in securing networked computer systems. It provides the basic functionality for protecting the confidentiality, integrity, and authenticity of messages and data. Adding a message authentication code (MAC) to such a small sensor message adds a significant In this proposed work, we show our design for the efficient node authentication and key exchange that reduces the overhead in node re-authentication and also provides untraceablity of mobile nodes. We introduce protocols that are improved MD5 hashing approach with key crypto system based and public key crypto system. Efficient method of membership verification for re-authentication of mobile node and show the performance analysis of our membership verification. Using this method, we propose an efficient and scalable reauthentication protocol over wireless sensor network. Also, we provide performance and security analysis of our protocol.


[1]. An Efficient and Scalable Re-authentication Protocol over Wireless Sensor Network, Jangseong Kim, Joonsang Baek IEEE Transactions on Consumer Electronics, Vol. 57, No. 2, May 2011.
[2]. Authentication and Information Integrity in Wireless Sensor Networks Diploma Thesis by Moritz Killat.
[3]. J. Ibriq and I. Mahgoub, “A Hierarchical Key Management Scheme for Wireless Sensor Networks”, 21st International Conference on Advanced Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada, pp.210~219.
[4]Authentication in Smart Home and WPAN”, IEEE Trans. On Consumer Electronics, Vol. 56, No. 2, May 2010, pp. 591-596..
[5] L. Eschenauer and V.D. Gligor. A key management scheme for distributed sensor networks". In Proceedings of the 9th ACM conference on Computer and Communications Security (CCS). Washington. DC. USA, :41-47, 2002.
[6] Yun Zhou,“MABS: Multicast Authentication based on Batch Signature,” IEEE Transactions on Mobile Computing, Vol. 9, No. 7, pp. 982-993, Jul 2010.
[7] Dexin Yang and Bo Yang,“A Novel Two-Server Password Authentication Scheme with Provable Security,” IEEE International Conference on Computer and Information Technology (CIT), Bradford, UK, Jul 1, pp. 1605-1609, 2010.
[8] Kui Ren,“Multi-User Broadcast Authentication in Wireless Sensor Networks,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 8, pp. 4554-4564, Oct 2009.
[9] Xuefei Cao,“Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 7, pp.3508-3517, Sep 2009.
[10]. T. M. Baduge, A. Hiromori, H. Yamaguchi, and T. Higashino, “A distributed algorithm for constructing minimum delay spanning trees under bandwidth constraints on overlay networks,” Systems and Computers in Japan, vol. 37, no. 14, pp. 15–24, 2006.

Keywords:- Network,Client,Server,Nodes.