Abstract
Wireless sensor networks described as an emerging new technology with a very promising future. Advances made in wireless sensor networks (WSNs) are the merging of advanced electronic and wireless technologies. Due to the popularity gained by the wireless environment, Security is the main concern. Node authentication without compromising lifespan of the networks is practically a daunting task. This research work introduces a new model, IBE-ECC that administers the energy of sensor nodes with faster authentication process. Signature verification model is deployed to achieve faster authentication process. Nevertheless, the public key-based strategies eliminate the security process but their verification process takes larger time. Therefore, authentication speed is a major constraint of our research endeavor. The proposed scheme is design to achieve high security and fast authentication with energy efficiency. It uses identity-based encryption on elliptic curve cryptography and a user authentication with an energy efficient key management. Further, to improve the speed of the authentication, it reduces the signature size so that it would accelerate signature verification faster. Hence, the proposed scheme will provide a secure key management, energy efficiency, fast authentication and additionally, computation overhead and communication costs are minimized. Finally, the experimental result demonstrates that the proposed strategy obtains 4797 ms higher execution efficiency and 45. 53% lower computation costs than existing schemes.
Similar content being viewed by others
References
Akyildi, I.F., Su, W., Sankarasubramaniam, Y., et al.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Romer, K., Mattern, F., et al.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11(6), 54–61 (2004)
Sivaraman, E.: An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring. Ad Hoc Netw. 11(3), 798–817 (2013)
Owojaiye, G., Sun, Y., et al.: Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring. Ad Hoc Netw. 11(3), 1237–1253 (2013)
Sun, E.A., et al.: Mise-pipe: magnetic induction-based wireless sensor networks for underground pipeline monitoring. Ad Hoc Netw. 9(3), 218–227 (2011)
Bottero, M., Dalla Chiara, B., Defiorio, F., et al.: Wireless sensor networks for traffic monitoring in a logistics centre. Transp. Res. Part C Emerg. Technol. 26, 99–124 (2013)
Ramesh, M.: Design, development, and deployment of a wireless sensor network for detection of landslides. Ad Hoc Netw. 13, 2–18 (2012)
Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M., et al.: An efficient broadcast authentication scheme in wireless sensor networks. In Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS’06, pp. 311–320 (2006)
Lee, J., Kim, S., Cho, Y., Chung, Y., Park, Y., et al.: HORSIC: an efficient one-time signaturescheme for wireless sensor networks. Inf. Process. Lett. 112(20), 783–787 (2012)
Turkanovi’c, M., Hlbl, M., et al.: Notes on a temporal-credential-based mutual authentication and key agreement scheme for wireless sensornetworks. Wirel. Pers. Commun. 77(2), 907–922 (2013)
Hongbin, M., Yingli, W., Shuang, Y., et al.: Hybrid keymanagement mechanism based on double cluster head structure, 2nd International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), IEEE, pp. 1164–1167, (2012)
Fan, Y., et al.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Commun. Syts. 36(1), 316–323 (2012)
Wong, K.H.M., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1, p. 8–17 (2006)
Das, A.K., et al.: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5), 1646–1656 (2012)
Odelu V, Das A.K., Alghathbar and Khan et al.: A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Secur. Commun. Netw. (2011)
Chen, T., Shih, W.: A robust mutual authentication protocol for wireless sensor networks. Etri J. 32(5), 704–712 (2012)
Jiang, Q., J. Ma., Lu, X., Tian, Y. et al.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. (2014)
Chun, C., Daojing, H., Sammy, C., Jiajun, B., Yi, G., Rong, F.: Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3), 347–62 (2014)
Amin, R., Biswas, G.P., et al.: A novel user authentication and key agreement protocol for accessing multi medical server usable in TMIS. J. Med. Syst. 39(3), 33 (2015)
Shim, K.-A., Lee, Y.-R., Park, C.-M.: EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)
Benzaid, C., Saiah, A., Badache, N.: An enhanced secure pairwise broadcast time synchronization protocol in wireless sensor networks. In Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed, and Network based Processing, PDP’2014, pp. 569–573 (2014)
Varatharajan, R., Manogaran, G., Priyan, M.K., Sundarasekar, R.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput. 1, 1–10 (2017)
Varatharajan, R., Manogaran, G., Priyan, M.K., Balaş, V.E., Barna, C.: Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed. Tools Appl. 1, 1–21 (2017)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sogani, A., Jain, A. Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks. Cluster Comput 22 (Suppl 5), 10637–10648 (2019). https://doi.org/10.1007/s10586-017-1151-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1151-6