| Literature DB >> 24521942 |
Pardeep Kumar1, Mika Ylianttila2, Andrei Gurtov3, Sang-Gon Lee4, Hoon-Jae Lee5.
Abstract
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.Entities:
Year: 2014 PMID: 24521942 PMCID: PMC3958232 DOI: 10.3390/s140202732
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.A system model for distributed WSN applications.
Notations and descriptions.
| A base-station and its identity | |
| High-capacity sensor (Cluster-head) and identity of | |
| Low-capacity sensor and identity of | |
| Key pool for H-sensors, and for L-sensors | |
| Pool key for | |
| Key index of | |
| Pool key for | |
| Key index of | |
| Location of | |
| Symmetric encryption and decryption using key | |
| Symmetric decryption using key | |
| One way hash function, e.g., | |
| Bit-wise |
Figure 2.The message flow of an H-To-L link.
Figure 3.The messages flow of H-To-BS link.
Security services comparisons with the existing protocols.
| S1 | N | N | N | N | N | N | |
| S2 | N | W | W | N | N | W | |
| S3 | N | N | Y | Y | Y | Y | |
| S4 | N | W | N | Y | N | N | |
| S5 | N | N | N | N | N | P | |
| S6 | Y | N | N | W | N | Y | |
| S7 | Y | N | Y | Y | N | Y | |
| S8 | N | N | N | N | N | P | |
| S9 | N | N | N | N | N | P | |
| S10 | N | Y | N | Y | Y | Y |
S1 = Mutual authentication; S2 = Strong dynamic session key; S3 = Message confidentiality; S4 = Message freshness; S5 = Identity privacy; S6 = Key revocation; S7 = New node addition; S8= Secure against MITM; S9 = Secure against information-leakage attack; S10: Secure against replay attack; N = No; Y = Yes; W = Weak; and P = Partial.
Computation cost for H-To-L and H-To-BS link operations.
|
| ||||
|---|---|---|---|---|
| Hash | 2 | 2 | 2 | 2 |
| Encryption | 1 | 1 | 1 | 1 |
| Decryption | 1 | 1 | 1 | 1 |
Communication cost for H-To-L and H-To-BS links.
| No. of messages exchanged | 3 | 2 |