Wireless Sensor Network

Only available on StudyMode
  • Topic: Cryptographic hash function, Sensor node, Cryptography
  • Pages : 56 (15813 words )
  • Download(s) : 20
  • Published : May 7, 2013
Open Document
Text Preview
An Efficient Node Authentication Algorithm
for
Wireless Sensor Network Using
Public Key Cryptography and Hashing
(Simulation & Algorithm)

Syed Osama Meraj
Department of Computer Science
Mohammad Ali Jinnah University
dreamzunlimited81@hotmail.com

Sir. Rizwan ur Rashid
Mohammad Ali Jinnah University
rizwan@jinnah.edu

1.Abstract:
The need for security in WSNs is unavoidable. Applications such as military, medical care, structural monitoring, and surveillance systems require information security in the network. As current security mechanisms for WSNs are not sufficient, development of new security schemes for WSNs is necessary. Nowadays research and applications of Wireless Sensor Network have attracted people’s attention. Since sensor nodes in WSN are resource-constrained, the security solutions for WSN become difficult. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages, data integrity verification which prevents modification of data from going undetected. Traditional security measures require heavy communication and computational resources and cryptographically complex security solutions for sensor networks are not suitable for WSN. In this paper, I have proposed an algorithm for node authentication by using cryptographic hash function and public key cryptography technique in Wireless Sensor Network .Which can fulfill confidential communication and mutual authentication between nodes, enhances scalability, node authentication security and prevents node impersonation.

2.Introduction:
Wireless sensor networks consist of a large number of such sensor nodes and are able to collect and disseminate data in areas where ordinary networks are unsuitable for environment. Wireless sensor networks use new technology and standards. They involve small, energy-efficient devices, hardware/software co-design, and networking support. When sensor nodes are deployed on the field, they will become vulnerable to be attacked. Therefore, it is important to provide node authentication security to the network, usually by using cryptology and authentication technique. Wireless sensor networks are additionally vulnerable to security breaches because they are physically more accessible to possible adversaries. Furthermore, wireless communication is less reliable due to noise and shortage of power of sensors.

2.1 Cryptographic Hash Functions:
A hash function is a function that takes some message of any length as input and transforms it into a fixed length output called a "Hash Value".

2.2 Difference between Hashing and Encryption:
Hashing is the process of taking any input and transforming it into a fixed length string. This output which is obtained is called the hash value/message digest. In informal terms, a hash is a sort of signature/identification for some stream of data which represents the value of the data. It is a one-way transformation. The hash function actually takes care of the transformation. 2.2.1 Encryption: Transforms the plaintext into cipher text, and decryption reverses the process and allows the original text to be reinstated.

2.2.2 Hashing: On the other hand, it is a one way operation in which data is converted into a message digest. There is no decrypting the hashed messages.

3. Application:
Wireless sensor networks are becoming an important part of everyday life, industrial and military applications. Wireless sensor networks are a unique class of mobile ad hoc network consisting of tiny low-cost resource constrained devices that have the ability to sense their Environment to in-process, to aggregate and to send the data to a destination. The deployment nature and limitations of the nodes resources.

4. Related Work:
Authentication is necessary to not only data exchange process but also network administrative tasks. So far, data...
tracking img