Authentication and En-route Data Filtering for Wireless Sensor Networks in the Internet of Things Scenario
نویسندگان
چکیده
To become an indispensable part of the Internet of Things (IoT), wireless sensor networks (WSNs) have to be integrated into the Internet. Under such circumstances, any IP-enabled node in the Internet shall be able to directly communicate with any sensor node in a WSN. Then, multiple sensor nodes can be used to monitor an event and jointly generate a report to be sent to one or more Internet nodes for monitoring purposes. Hence, it becomes imperative that every event report that is transmitted from within the WSN be authenticated to intended Internet users and efficiently filtered on its way to the Internet users. However, most present authentication and en-route data filtering schemes developed for WSNs don’t consider the Internet scenario while traditional mechanisms developed for the Internet can hardly be suitable due to resource constraints of sensor nodes in WSNs. In this paper, we propose an authentication and en-route data filtering scheme for WSNs in the IoT scenario in which signature shares based on the most efficient ID-based signature scheme are generated and distributed by making use of verifiable secret sharing cryptography. Security analysis shows that the proposed scheme can defend against node compromise attacks as well as denial of service (DoS) attacks that cause report disruption and selective forwarding problems. Energy consumption as the result of computation and communication is also analyzed to show the advantages of our scheme compared to some other comparable schemes.
منابع مشابه
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملCooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks
Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative BitCompressed Authentication (CBA) is based on random graph characteristic of sensor node deployment and a cooperative bit...
متن کاملA meta-heuristic clustering method to reduce energy consumption in Internet of Things
The Internet of Things (IoT) is an emerging phenomenon in the field of communication, in which smart objects communicate with each other and respond to user requests. The IoT provides an integrated framework providing interoperability across various platforms. One of the most essential and necessary components of IoT is wireless sensor networks. Sensor networks play a vital role in the lowest l...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013