oalogo2  

AUTHOR(S):

Yusnani Mohd Yussoff, Nazhatul Hafizah Kamarudin, Habibah Hashim

 

TITLE

Lightweight Trusted Authentication Protocol for Wireless Sensor Network (WSN)

pdf PDF

ABSTRACT

Wireless Sensor Network is a network consisting of tiny and limited power sensor nodes communicate wirelessly and being deployed at any random places. The unique feature of Wireless Sensor Networks that enable continuous data collection and monitoring has accelerate the development of sensor network related applications ranging from non-sensitive to highly sensitive data applications. However, due to its ability to work without human intervention, the sensor nodes are susceptible to clone nodes types of attacks. These will then leads to worst consequences which is false message. Therefore secure communication is no more enough in Wireless Sensor Network Environment. This paper present a rigorous research work in the development of a lightweight trusted authentication protocol for wireless embedded devices in the Wireless Sensor Networks environment. The term trust in this research work is based on trusted Computing Group definition and therefore the development start from the sensor node. Following that, a remote attestation protocol name as IBE_Trust is presented and analyzed. Acknowledging the energy constraint faced by the target devices, analysis on the power consumption is conducted to ensure its feasibility. Finally, this paper suggests the application in e-health mobile device authentication for wireless sensor network. By integrating the trusted authentication protocol in mobile health monitoring system, it will propose a great assistance in patient-doctor interaction since it is required to protect the security of the data network.

KEYWORDS

Trust; Performance; Cryptography; Transmission; IBE; WSN

REFERENCES

[1] “Copyright ©2011 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved,” Group, 2011. [Online]. Available: http://www.trustedcomputinggroup.org/files/stat ic_page_files/BDEACD8E-1A4B-B294- D06D2F15D16238AE/TCG FACTSHEET_rev Jan 19 2011 (3).pdf.

[2] G. Padmavathi, “A Survey of Attacks , Security Mechanisms and Challenges in Wireless Sensor Networks,” Journal of Computer Science, vol. 4, no. 1, pp. 1–9, 2009.

[3] Y. M. Yussoff, H. Hashim, R. Rosli, and M. D. Baba, “A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks,” Procedia Engineering, vol. 41, Iris, pp. 580–587, Jan. 2012.

[4] A. Forster, D. Puccinelli, and S. Giordano, “Sensor node lifetime: An experimental study,” 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 202–207, Mar. 2011.

[5] Y. M. Yussoff, H. Hashim, and U. T. Mara, “IBE-Trust : A Security Framework for Wireless Sensor Networks,” in Internet Security (WorldCIS), 2011 World Congress on, 2011, pp. 171–176.

[6] A. Shamir, “Identity-Based Cryptosystems and signature schemes,” in Proceedings of CRYPTO 84 on Advances in cryptology, 1984, pp. 47–53.

[7] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Computer, vol. 32, no. 3, pp. 586–615, 2003.

[8] A. S.Wander, N. Gura, H. Eberle, and Vipul Gupta, “Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks,” in PERCOM ’05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, 2005, pp. 324–328.

[9] K. Piotrowski, P. Langendoerfer, F. Oder, S. Peter, and D. S. Engineering, “How Public Key Cryptography Influences Wireless Sensor,” in SASN ’06 Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, 2006, pp. 169–176.

[10] A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, “Energy Analysis of Public-Key Cryptography on Small Wireless Devices,” in Pervasive Computing, 2005, pp. 324–328.

[11] Moises Salinas, Gina Gallegos Garcia and Gonzalo Duchen Sanchen, “Efficient Message Authentication Protocol for WSN,” in WSEAS TRANSACTIONS on COMPUTERS, 2009, Issue 6, Volume 8, June 2009.

[12] T. Avispa and T. Document, “AVISPA v1 . 1 User Manual,” 2006. [Online]. Available: www.avispa-project.org/package/usermanual. pdf. [Accessed: 30-Apr-2013].

[13] L. H. Adnan, Y. M. Yussoff, and H. Hashim, “Secure Boot Process for Wireless Sensor Node,” in Computer Applications and Industrial Electronics (ICCAIE), 2010 International Conference on, 2010, ICCAIE, pp. 646–649.

[14] M. C. Gorantla, C. Boyd, and J. M. G. Nieto, “ID-based One-pass Authenticated Key Establishment,” in Australasian Information Security Conference, AISC'08 Australia, 2008, pp. 39-46.

[15] L. H. Adnan, H. Hashim, Y. M. Yussoff, and M. U. Kamaluddin, “Root of Trust for Trusted Node Based-on ARM11 Platform,” in Conference on Communications (APCC), 2011 17th Asia- Pacific, 2011, no. October, pp. 812–815.

[16] Wangke YU, Shuhua WANG, “Key predistribution using combinatorial designs for wireless sensor networks,” in WSEAS TRANSACTIONS on MATHEMATICS, vol. 12, 2013.

[17] Jasmine Norman, “Optimized Routing for Sensor Networks using Wireless Broadcast Advantage,” in WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS, vol. 5,2013.

[18] “MIRACL Reference Manual.” [Online]. Available: https://wiki.certivox.com/display/EXT/MIRACL +Reference+Manual#MIRACLReferenceManua l-1MIRACLReferenceManual. [Accessed: 30- Apr-2013].

[19] M. Hebel, G. Bricker, and D. Harris, “Getting Started with XBee RF Modules.” [Online]. Available: http://www.parallax.com/portals/0/downloads/d ocs/prod/book/122-32450-xbeetutorial-v1.0.pdf. [Accessed: 30-Apr-2013].

[20] “XBee® 802_15_4 - Digi International.” [Online]. Available: http://www.digi.com/products/wireless-wiredembedded- solutions/zigbee-rf-modules/pointmultipoint- rfmodules/xbee-series1- module#specs.

[21] Rickard Söderlund, “Energy Efficient Authentication in Wireless Sensor Networks,” in Emerging Technologies and Factory Automation, 2007. ETFA. IEEE Conference on, 2006, pp. 1412 – 1416.

[22] A. Tiwari, P. Ballal, and F. L. Lewis, “Energyefficient wireless sensor network design and implementation for condition-based maintenance,” ACM Transactions on Sensor Networks, vol. 3, no. 1, Mar. 2007.

[23] “Sending data through an 802_15_4 network latency timing_Knowledge Base Article - Digi International.” .

[24] G. Ferrari, P. Medagliani, S. Di Piazza, and M. Martal, “Wireless Sensor Networks : Performance Analysis in Indoor Scenarios,” EURASIP Journal on Wireless Communications and Networking, vol. 2007, pp. 41–54, 2006.

Cite this paper

Yusnani Mohd Yussoff, Nazhatul Hafizah Kamarudin, Habibah Hashim. (2017) Lightweight Trusted Authentication Protocol for Wireless Sensor Network (WSN). International Journal of Communications, 2, 130-136

 

cc.png
Copyright © 2017 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0