A novel authentication and access control framework in wireless sensor networks

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Wireless Sensor Networking continues to evolve as one of the most challenging research areas. Considering the insecure nature of these networks and the fact that sensor nodes are distributed in a hostile environment, having a well-implemented security scheme is absolutely essential. Bearing in mind the important security services like authentication and access control, we have proposed a novel security framework for these networks. The new framework is based on Kerberos authentication and access control system. The Kerberos has been adopted for WSNs by utilizing Bloom Filter data structure and Elliptic Curve cryptography. In the proposed scheme, Bloom Filter data structure is used in a novel way; we have used this data structure to get rid of Public Key’s certificates. By combining Bloom Filter data structure and Elliptic Curve cryptography, we achieved a very light robust security framework that offers Authentication, Access Control, and key sharing services. The analysis results showed that our scheme provides more security services and is more robust in the presence of attacks compared to the previous schemes. In contrast, simulation results indicated that our system had significant improvements over the other schemes in many aspects such as power and time expenditure.

  • Keywords

    Wireless Sensor Network; Authentication; Access Control; Kerberos; Bloom Filter; Elliptic Curve Deffie-Hellman.

  • References

      [1] X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: a survey," Communications Surveys & Tutorials, IEEE, vol. 11, pp. 52-73, 2009. http://dx.doi.org/10.1109/SURV.2009.090205.

      [2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002. http://dx.doi.org/10.1109/MCOM.2002.1024422.

      [3] W. Ben Jaballah, A. Meddeb, and H. Youssef, "An efficient source authentication scheme in wireless sensor networks," in Computer Systems and Applications (AICCSA), 2010 IEEE/ACS International Conference on, 2010, pp. 1-7.

      [4] X. Cao, W. Kou, L. Dang, and B. Zhao, "IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks," Computer Communications, vol. 31, pp. 659-667, 2008. http://dx.doi.org/10.1016/j.comcom.2007.10.017.

      [5] A. D. Dhawale, M. Chandak, and N. Thakur, "Authentication Techniques for Wireless Sensor Network," in MPGI National Multi Conferences, 2012, pp. 1-4.

      [6] W. Ben Jaballah, M. Mosbah, H. Youssef, O. Ly, and A. Meddeb, "Modeling Source Authentication Protocols in Wireless Sensor Networks Using HLPSL," in Network and Information Systems Security (SAR-SSI), 2011 Conference on, 2011, pp. 1-9.

      [7] W. Stallings, Network Security Essentials: Applications and Standards, 4/e: Pearson Education India, 2003.

      [8] L. Tobarra, D. Cazorla, F. Cuartero, G. Diaz, and E. Cambronero, "Model checking wireless sensor network security protocols: Tinysec+ leap," in Wireless Sensor and Actor Networks, ed: Springer, 2007, pp. 95-106.

      [9] Y. Liu, J. Li, and M. Guizani, "PKC Based Broadcast Authentication using Signature Amortization for WSNs," Wireless Communications, IEEE Transactions on, vol. 11, pp. 2106-2115, 2012. http://dx.doi.org/10.1109/TWC.2012.032812.110433.

      [10] K. Sun, A. Liu, R. Xu, P. Ning, and D. Maughan, "Securing network access in wireless sensor networks," in Proceedings of the second ACM conference on Wireless network security, 2009, pp. 261-268. http://dx.doi.org/10.1145/1514274.1514310.

      [11] X. H. Le, M. Khalid, R. Sankar, and S. Lee, "An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare," Journal of Networks, vol. 6, pp. 355-364, 2011. http://dx.doi.org/10.4304/jnw.6.3.355-364.

      [12] J. Zhang and V. Varadharajan, "Wireless sensor network key management survey and taxonomy," Journal of Network and Computer Applications, vol. 33, pp. 63-75, 2010. http://dx.doi.org/10.1016/j.jnca.2009.10.001.

      [13] O. Delgado-Mohatar, A. Fúster-Sabater, and J. M. Sierra, "A light-weight authentication scheme for wireless sensor networks," Ad Hoc Networks, vol. 9, pp. 727-735, 2011. http://dx.doi.org/10.1016/j.adhoc.2010.08.020.

      [14] X. Fan and G. Gong, "Accelerating signature-based broadcast authentication for wireless sensor networks," Ad Hoc Networks, vol. 10, pp. 723-736, 2012. http://dx.doi.org/10.1016/j.adhoc.2011.06.015.

      [15] A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, pp. 521-534, 2002. http://dx.doi.org/10.1023/A:1016598314198.

      [16] P. Zeng, K. K. R. Choo, and D. Z. Sun, "On the security of an enhanced novel access control protocol for wireless sensor networks," Consumer Electronics, IEEE Transactions on, vol. 56, pp. 566-569, 2010. http://dx.doi.org/10.1109/TCE.2010.5505971.

      [17] B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, pp. 422-426, 1970. http://dx.doi.org/10.1145/362686.362692.

      [18] A. Broder and M. Mitzenmacher, "Network applications of bloom filters: A survey," Internet Mathematics, vol. 1, pp. 485-509, 2004. http://dx.doi.org/10.1080/15427951.2004.10129096.

      [19] N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Cryptographic Hardware and Embedded Systems-CHES 2004, ed: Springer, 2004, pp. 119-132.

      [20] D. Hankerson, S. Vanstone, and A. J. Menezes, Guide to elliptic curve cryptography: Springer, 2004.

      [21] E. Cayirci and C. Rong, Security in wireless ad hoc and sensor networks: John Wiley & Sons, 2008.

      [22] K.-A. Shim, Y.-R. Lee, and C.-M. Park, "EIBAS: An Efficient Identity-based Broadcast Authentication Scheme in wireless sensor networks," Ad Hoc Networks, vol. 11, pp. 182-189, 2013. http://dx.doi.org/10.1016/j.adhoc.2012.04.015.

      [23] A. Al-Mahmud and R. Akhtar, "secure sensor node authentication in wireless sensor networks," International Journal of Computer Applications, vol. 46, pp. 10-17, 2012.

      [24] A. K. Das, P. Sharma, S. Chatterjee, and J. K. Sing, "A dynamic password-based user authentication scheme for hierarchical wireless sensor networks," Journal of Network and Computer Applications, vol. 35, pp. 1646-1656, 2012. http://dx.doi.org/10.1016/j.jnca.2012.03.011.

      [25] H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks," International Journal of Security and Networks, vol. 1, pp. 127-137, 2006. http://dx.doi.org/10.1504/IJSN.2006.011772.

      [26] X. H. Le, S. Lee, I. Butun, M. Khalid, and R. Sankar, "An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography," Journal of Communications and Networks, vol. 11, p. 599, 2009. http://dx.doi.org/10.1109/JCN.2009.6388413.

      [27] B. Nouri-Moghaddam and H. R. Naji, "Improving HBQ Authentication and Access control in wireless sensor network," in Information and Knowledge Technology (IKT), 2013 5th Conference on, 2013, pp. 82-87.

      [28] N. Koblitz, "Elliptic curve cryptosystems," Mathematics of computation, vol. 48, pp. 203-209, 1987. http://dx.doi.org/10.1090/S0025-5718-1987-0866109-5.

      [29] V. S. Miller, "Use of elliptic curves in cryptography," in Advances in Cryptology—CRYPTO’85 Proceedings, 1986, pp. 417-426.

      [30] H. Wang and Q. Li, "Efficient implementation of public key cryptosystems on mote sensors (short paper)," in Information and communications security, ed: Springer, 2006, pp. 519-528.

      [31] W. Diffie and M. E. Hellman, "New directions in cryptography," Information Theory, IEEE Transactions on, vol. 22, pp. 644-654, 1976. http://dx.doi.org/10.1109/TIT.1976.1055638.

      [32] "http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/key-size.htm," 2015.

      [33] "http://www.nsa.gov/business/programs/elliptic_curve.shtml," 2015.




Article ID: 4307
DOI: 10.14419/jacst.v4i1.4307

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.