scholarly journals Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Wenting Li ◽  
Bin Li ◽  
Yiming Zhao ◽  
Ping Wang ◽  
Fushan Wei

Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and academic community. To facilitate real-time data access for external users from the sensor nodes directly, password-based authentication has become the prevalent authentication mechanism in the past decades. In this work, we investigate three foremost protocols in the area of password-based user authentication scheme for WSNs. Firstly, we analyze an efficient and anonymous protocol and demonstrate that though this protocol is equipped with a formal proof, it actually has several security loopholes been overlooked, such that it cannot resist against smart card loss attack and violate forward secrecy. Secondly, we scrutinize a lightweight protocol and point out that it cannot achieve the claimed security goal of forward secrecy, as well as suffering from user anonymity violation attack and offline password guessing attack. Thirdly, we find that an anonymous scheme fails to preserve two critical properties of forward secrecy and user friendliness. In addition, by adopting the “perfect forward secrecy (PFS)” principle, we provide several effective countermeasures to remedy the identified weaknesses. To test the necessity and effectiveness of our suggestions, we conduct a comparison of 10 representative schemes in terms of the underlying cryptographic primitives used for realizing forward secrecy.

2019 ◽  
Vol 38 (4) ◽  
pp. 1009-1020
Author(s):  
Muhammad Shahzaib Sana ◽  
Muhammad Yousaf Ali Khan ◽  
Nasir Saleem ◽  
Imran Ullah Khan ◽  
Arbab Waheed Ahmed

The WSNs (Wireless Sensor Networks) lead to great opportunities to explore it scientifically. In this network different numbers of SN (Sensor Nodes) are deployed in a specific area to gather information. The UWSNs (Underwater Wireless Sensor Networks) is a highly distributed network of sensor nodes deployed underwater to gather environmental information. Hence, acquirement of real-time data at enhanced data rate and to reduce power consumption is a key concern while designing routing protocol for UWSNs. In this paper, a cooperation based solution is suggested. The solution proposed here uses the DF (Decode and Forward) strategy for relying the information from the source to the destination using a relay node. The signals coming towards the destination are weighted and combined on the basis of their SNRC (Signal to Noise Ratio Combing). The simulation results verify enhancement in different factors, required for evaluation of a UWSN. After implementation of the proposed solution the stability of the network is increased which maximize the PDR (Packet Delivery Ratio). In our proposed solution the transmission is based on channel estimation, an estimate is made for higher reliable channel, which reduces retransmission of packets. Hence, sink receive the packets with lesser delay and as a result E2E (End-to-End) delay is decreased. Data is forwarded using data forwarding by neighbor nodes. It improves average energy consumption of the system. Hence the overall performance and lifetime of a UWSN is increased.


Nowadays Wireless Sensor Networks are using Internet-of-Thing (IoT) technology-based nodes because of the wide usance and cost effectiveness. Many of the Wireless sensor nodes are battery powered devices with limited computational and communication resources. The algorithm of the conventional wireless sensor networks are designed for small closed group network communications with better power management and reasonable security strategies. When using IoT based Wireless sensor networks, the nodes are used to communicate with the internet, where there is a need for more secured algorithm. The internet protocols are having powerful security authentication systems those require more computational resources, thus they can drain a battery operated little wireless sensor node. This work is indented to introduce a legacy power-security balanced algorithm to use in the IoT based Wireless Sensor Network environments. Proxy Mobile Internet Protocol version 6 (PMIPv6) is selected as the base protocol in which the proposed security authentication mechanism is used instead of inbuilt Diffie-Hellman authentication scheme. A customized Media Access Control (MAC) address-based session key initialization procedure along with seed based random number session key update mechanism is proposed and verified in this work.


Author(s):  
K G Shanthi ◽  
S Sesha Vidhya ◽  
G Vishali ◽  
R V Uma ◽  
M Thanuja ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 936
Author(s):  
Deok Kyu Kwon ◽  
Sung Jin Yu ◽  
Joon Young Lee ◽  
Seung Hwan Son ◽  
Young Ho Park

Wireless sensor networks (WSN) are widely used to provide users with convenient services such as health-care, and smart home. To provide convenient services, sensor nodes in WSN environments collect and send the sensing data to the gateway. However, it can suffer from serious security issues because susceptible messages are exchanged through an insecure channel. Therefore, secure authentication protocols are necessary to prevent security flaws in WSN. In 2020, Moghadam et al. suggested an efficient authentication and key agreement scheme in WSN. Unfortunately, we discover that Moghadam et al.’s scheme cannot prevent insider and session-specific random number leakage attacks. We also prove that Moghadam et al.’s scheme does not ensure perfect forward secrecy. To prevent security vulnerabilities of Moghadam et al.’s scheme, we propose a secure and lightweight mutual authentication protocol for WSNs (WSN-SLAP). WSN-SLAP has the resistance from various security drawbacks, and provides perfect forward secrecy and mutual authentication. We prove the security of WSN-SLAP by using Burrows-Abadi-Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. In addition, we evaluate the performance of WSN-SLAP compared with existing related protocols. We demonstrate that WSN-SLAP is more secure and suitable than previous protocols for WSN environments.


2018 ◽  
Vol 14 (08) ◽  
pp. 94
Author(s):  
Li Zhaoyan ◽  
Zhao Chengfang

A new routing rule detection and identity authentication mechanism based on the path sequence is proposed to cope with the vulnerability problem of wireless sensor networks (WSNs) against various attacks, especially in unattended environments. Then, the great permutation encryption algorithm (G-PEC) for WSN is proposed. Finally, a signature scheme against pollution attack based on linear network coding is improved. The results show that the proposed path sequence-based authentication method with the Contiki simulation platform can significantly reduce the computing overhead of sensor nodes and decrease the energy consumption and delay of nodes to a greater extent than the traditional authentication method. The G-PEC can effectively resist eavesdropping attack, and the new signature scheme does not need additional secure channels. The proposed mechanism also provides source message authentication.


2005 ◽  
Vol 4 (2) ◽  
pp. 713-721 ◽  
Author(s):  
Santhosh Simon ◽  
K Paulose Jacob

Wireless sensor networks (WSNs) can be meritoriously used in several application areas like agriculture, military surveillance, environmental monitoring, forest fire detection etc. Since they are used to monitor large geographic areas numerous sensor nodes are to be deployed and their radio range is also very short. Hence they depend on the cooperative effort of these densely deployed sensor nodes for reporting the sensed data. Any changes in environment or an event of interest may be initially observed in a particular area. In other words, they are correlated in space domain. Many nodes in that area may detect the event and report the same event. This redundant information is of no use to system and also depletes the precious energy of the intermediate sensor nodes. Sensor nodes are having very limited energy and needs to be conserved for attaining maximum network life time. Data aggregation is an effective technique for conserving energy by reducing the packet transmissions. Many aggregation systems are available, but when employed for large scale wireless sensor networks they are less effective. In this paper we propose a scheme for large scale WSNs which effectively uses the spatial correlation and temporal correlation of the data for effective aggregation and thereby preserving precious energy.


Sign in / Sign up

Export Citation Format

Share Document