Skip to main content

A Lightweight Key Negotiation and Authentication Scheme for Large Scale WSNs

  • Chapter
  • First Online:
Recent Trends and Advances in Wireless and IoT-enabled Networks

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

Wireless sensor networks (WSNs) are being used as remote monitoring and control systems in a number of industries, including health care, defense, agriculture, and disaster management. To ensure that their applications operate reliably, the requirements for the security and integrity of data have increased. Because WSNs are operating as backbone networks, there is a strong need to examine the security of these networks. However, the lack of administration infrastructure at the network level and scarce resources such as processing, power, and storage have made it challenging to find a proper security solution. Among the currently available solutions, single master key-based schemes have gained considerable popularity due to their lower communicational and computational burdens. Recent investigations have shown that these schemes have major drawbacks because of their susceptibility to attacks that involve the physical capture and tampering of nodes. If not handled properly, these attacks can compromise the network and cause a catastrophic situation. In this chapter, a new scheme is proposed: a lightweight system for key exchange and authentication. This scheme also contains countermeasures against physical capturing and tampering attacks. The results obtained from a simulation indicate that the scheme performs well with regard to the utilization of memory and power.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dargie, W., & Zimmerling, M. (2007). Sensor networks in the context of developing countries. In The 3rd IFIP World Information Technology Forum (WITFOR). Addis Ababa, Ethiopia.

    Google Scholar 

  2. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.

    Article  Google Scholar 

  3. Stajano, F. (2002). Security for ubiquitous computing. Chichester, UK: Wiley.

    Book  Google Scholar 

  4. Ojha, T., Misra, S., & Raghuwanshi, N. S. (2015). Wireless sensor networks for agriculture: The state-of-the-art in practice and future challenges. Computers and Electronics in Agriculture, 118, 66–84.

    Article  Google Scholar 

  5. Batista, N. C., Melício, R., Matias, J. C. O., & Catalão, J. P. S. (2013). Photovoltaic and wind energy systems monitoring and building/home energy management using ZigBee devices within a smart grid. Energy, 49, 306–315.

    Article  Google Scholar 

  6. Zhou, H., & Goold, B. (2015). A domestic Adaptable Infant Monitoring System using wireless sensor networks. In IEEE 34th International Performance Computing and Communications Conference (IPCCC) (pp. 1–2).

    Google Scholar 

  7. Lin, B. S., Wong, A. M., & Tseng, K. C. (2016). Community-based ECG monitoring system for patients with cardiovascular diseases. Journal of Medical Systems, 40(4), 1–12.

    Google Scholar 

  8. Gome, A., Magno, M., Lagadec, M. F., & Benini, L. (2017). Precise, energy-efficient data acquisition architecture for monitoring radioactivity using self-sustainable wireless sensor nodes. IEEE Sensors Journal, 18(1), 459–469.

    Article  Google Scholar 

  9. Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. In Communications of the ACM (pp. 53–57). New York: ACM.

    Google Scholar 

  10. Prasanna, S., & Rao, S. (2012). An overview of wireless sensor networks applications and security. International Journal of Soft Computing and Engineering (IJSCE), 2(2), 2231–2307.

    Google Scholar 

  11. Delgado-Mohatar, O., Fúster-Sabater, A., & Sierra, J. M. (2011). A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks, 9, 727–735.

    Article  Google Scholar 

  12. Chan, H., Perrig, A., & Song, D. (2003). Random key pre distribution schemes for sensor networks. In Proceedings of Symposium on Security and Privacy 2003 (pp. 197–213).

    Google Scholar 

  13. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8, 228–258.

    Article  Google Scholar 

  14. Menezes, A. Z., van Oorschot, P. C., & Varstone, S. A. (1997). Handbook of applied cryptography. Boca Raton, FL: CRC Press.

    MATH  Google Scholar 

  15. Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2, 500–528.

    Article  Google Scholar 

  16. Lai, B., Hwang, D. D., Kim, S. P., & Verbauwhede, I. (2004). Reducing radio energy consumption of key management protocols for wireless sensor networks. In Proceedings of the 2004 International Symposium on Low Power Electronics and Design (pp. 351–356). New York: ACM.

    Google Scholar 

  17. Sojka-Piotrowska, A., & Langendoerfer, P. (2017). Shortening the security parameters in lightweight WSN applications for IoT-lessons learned. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (Vol. 13, pp. 636–641).

    Chapter  Google Scholar 

  18. Barker, E., Barker, W., Burr, W., Polk, W., & Smid, M. (2007). NIST special publication. NIST Special Publication, 800, 1–142.

    Google Scholar 

  19. Gupta, A., & Kuri, J. (2008). Deterministic schemes for key distribution in wireless sensor networks. In 3rd International Conference 2008 on Communication Systems Software and Middleware and Workshop (pp. 452–459). Banglore, India: IEEE.

    Google Scholar 

  20. Rautray, R., & Sarangi, I. (2011). A survey on authentication protocols for wireless sensor network. International Journal of Engineering, Science and Technology (IJEST), 3, 4253–4256.

    Google Scholar 

  21. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security CCS-02 (pp. 41–47). New York: ACM.

    Google Scholar 

  22. Sangwan, A., Sindhu, D., & Singh, K. (2011). A review of various security protocols in wireless sensor network. International Journal of Computer Technology, 2, 790–797.

    Google Scholar 

  23. Anderson, R., Chan, H., & Perrig, A. (2004). Key infection smart trust for smart dust. In Proceedings of the 12th IEEE International Conference 2004 on Network Protocols (pp. 206–215). Cambridge, UK: IEEE.

    Google Scholar 

  24. Gupta, S., Verma, H. K., & Sangal, A. L. (2010). Authentication protocol for wireless sensor networks. World Academy of Science, Engineering and Technology, 42, 630–636.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Tehseen, M., Javed, H., Shah, I.H., Ahmed, S. (2019). A Lightweight Key Negotiation and Authentication Scheme for Large Scale WSNs. In: Jan, M., Khan, F., Alam, M. (eds) Recent Trends and Advances in Wireless and IoT-enabled Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-99966-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99966-1_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99965-4

  • Online ISBN: 978-3-319-99966-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics