Identity Based Authentication using a Cross Layer Design approach in Wireless Sensor Networks

نویسندگان

  • Harsh Kupwade Patil
  • Joseph Camp
  • Stephen A. Szygenda
چکیده

The development of Wireless Sensor Networks (WSN) was originally motivated for military applications such as battlefield surveillance. However, in recent years it has gained popularity in many civilian applications: such as habitat monitoring, healthcare, home automation, traffic control and environmental monitoring. As more low cost, low power and multifunctional sensor nodes are being deployed, security in such sensor networks become one of the prominent issues in WSN. Recent advances in wireless networks did not give the necessary attention to security with regard to device constraints, since they base their design on legacy wireless networks. As more security solutions are being proposed in WSN, there is an increase in the lack of co-ordination between various security measures at different layers, leading to functional redundancy and increased overhead. As WSN scale to a very large number, current malicious node detection schemes will be resource intensive and inefficient Therefore, new approaches are being sought to efficiently use information from different protocol layers to propose security. They not only focus on layer interactions within a node, but also adapt to changes in the network conditions and adaptively optimize cross-layer interactions across different nodes. It has been shown that pairing based crypto operations are possible on sensor nodes (motes) and a completely new security suite is being developed for WSN using Identity based Cryptography. In this paper, we propose a new cross-layer design approach for WSN using Identity based cryptography. This approach combines cross-layer design principles along with Identity based Cryptography to provide a new set of security solutions, which could be more efficient in storage, computation and energy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Multi-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms

Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...

متن کامل

Hypercube Bivariate-Based Key Management for Wireless Sensor Networks

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

متن کامل

A Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks

Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011