Wireless Sensor Network

Topics: Cryptographic hash function, Sensor node, Cryptography Pages: 56 (15813 words) Published: May 7, 2013
An Efficient Node Authentication Algorithm
Wireless Sensor Network Using
Public Key Cryptography and Hashing
(Simulation & Algorithm)

Syed Osama Meraj
Department of Computer Science
Mohammad Ali Jinnah University

Sir. Rizwan ur Rashid
Mohammad Ali Jinnah University

The need for security in WSNs is unavoidable. Applications such as military, medical care, structural monitoring, and surveillance systems require information security in the network. As current security mechanisms for WSNs are not sufficient, development of new security schemes for WSNs is necessary. Nowadays research and applications of Wireless Sensor Network have attracted people’s attention. Since sensor nodes in WSN are resource-constrained, the security solutions for WSN become difficult. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages, data integrity verification which prevents modification of data from going undetected. Traditional security measures require heavy communication and computational resources and cryptographically complex security solutions for sensor networks are not suitable for WSN. In this paper, I have proposed an algorithm for node authentication by using cryptographic hash function and public key cryptography technique in Wireless Sensor Network .Which can fulfill confidential communication and mutual authentication between nodes, enhances scalability, node authentication security and prevents node impersonation.

Wireless sensor networks consist of a large number of such sensor nodes and are able to collect and disseminate data in areas where ordinary networks are unsuitable for environment. Wireless sensor networks use new technology and standards. They involve small, energy-efficient devices, hardware/software co-design, and networking support. When sensor nodes are deployed on the field, they will become vulnerable to be attacked. Therefore, it is important to provide node authentication security to the network, usually by using cryptology and authentication technique. Wireless sensor networks are additionally vulnerable to security breaches because they are physically more accessible to possible adversaries. Furthermore, wireless communication is less reliable due to noise and shortage of power of sensors.

2.1 Cryptographic Hash Functions:
A hash function is a function that takes some message of any length as input and transforms it into a fixed length output called a "Hash Value".

2.2 Difference between Hashing and Encryption:
Hashing is the process of taking any input and transforming it into a fixed length string. This output which is obtained is called the hash value/message digest. In informal terms, a hash is a sort of signature/identification for some stream of data which represents the value of the data. It is a one-way transformation. The hash function actually takes care of the transformation. 2.2.1 Encryption: Transforms the plaintext into cipher text, and decryption reverses the process and allows the original text to be reinstated.

2.2.2 Hashing: On the other hand, it is a one way operation in which data is converted into a message digest. There is no decrypting the hashed messages.

3. Application:
Wireless sensor networks are becoming an important part of everyday life, industrial and military applications. Wireless sensor networks are a unique class of mobile ad hoc network consisting of tiny low-cost resource constrained devices that have the ability to sense their Environment to in-process, to aggregate and to send the data to a destination. The deployment nature and limitations of the nodes resources.

4. Related Work:
Authentication is necessary to not only data exchange process but also network administrative tasks. So far, data...

References: [1] KunZhang, Cuirong Wang “A new Group Key Management Scheme with Simple Hash Based Authentication for Wireless Sensor Networks” 2010 International Conference on Computer Design and applications (ICCDA 2010) IEEE 2010.
[9] Chong & Kumar, 2003; Akyildiz, Su, Sankarasubramaniam & Cayirci, 2002; Culler, Estrin & Srivastava, 2004
[10] Garth V
[20] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: securing sensor networks with public key technology," in Proc. ACM Workshop Security of Ad Hoc Sensor Networks, pp. 59-64, 2004.
[24]“Adaptive Authentication Mechanism using Node Reputation on Mobile Medical Sensor Networks” Mihui Kim and Kijoon Chae Feb. 17-20, 2008 ICACT 2008
[25]”Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes” Keith M
[26]”An Efficient Authentication Strategy for Reprogramming of Sensor Networks” Jin Tan, JinTan Chen, YanQiu Liu, 2007 International Conference on Computational Intelligence and Security, 2007 IEEE.
[29] “Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks” Roberto Di Pietro · Luigi V. Mancini · Alessandro Mei, Wireless Netw (2006) 12:709–721 Springer.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • wireless sensors networks Research Paper
  • Essay on Smart Sensors
  • Routing in Wireless Sensor Networks Essay
  • Wireless Sensor Networks Essay
  • Bluetooth Based Smart Sensor Network Essay
  • Wireless networks Essay
  • Ant Colony Optimization for Routing in Wireless Sensor Network Essay
  • Multichannel Mac Protocols for Wireless Networks Essay

Become a StudyMode Member

Sign Up - It's Free