Skip to main content

Advertisement

Log in

Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Wireless sensor networks described as an emerging new technology with a very promising future. Advances made in wireless sensor networks (WSNs) are the merging of advanced electronic and wireless technologies. Due to the popularity gained by the wireless environment, Security is the main concern. Node authentication without compromising lifespan of the networks is practically a daunting task. This research work introduces a new model, IBE-ECC that administers the energy of sensor nodes with faster authentication process. Signature verification model is deployed to achieve faster authentication process. Nevertheless, the public key-based strategies eliminate the security process but their verification process takes larger time. Therefore, authentication speed is a major constraint of our research endeavor. The proposed scheme is design to achieve high security and fast authentication with energy efficiency. It uses identity-based encryption on elliptic curve cryptography and a user authentication with an energy efficient key management. Further, to improve the speed of the authentication, it reduces the signature size so that it would accelerate signature verification faster. Hence, the proposed scheme will provide a secure key management, energy efficiency, fast authentication and additionally, computation overhead and communication costs are minimized. Finally, the experimental result demonstrates that the proposed strategy obtains 4797 ms higher execution efficiency and 45. 53% lower computation costs than existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Akyildi, I.F., Su, W., Sankarasubramaniam, Y., et al.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Romer, K., Mattern, F., et al.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11(6), 54–61 (2004)

    Article  Google Scholar 

  3. Sivaraman, E.: An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring. Ad Hoc Netw. 11(3), 798–817 (2013)

    Article  Google Scholar 

  4. Owojaiye, G., Sun, Y., et al.: Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring. Ad Hoc Netw. 11(3), 1237–1253 (2013)

    Article  Google Scholar 

  5. Sun, E.A., et al.: Mise-pipe: magnetic induction-based wireless sensor networks for underground pipeline monitoring. Ad Hoc Netw. 9(3), 218–227 (2011)

    Article  Google Scholar 

  6. Bottero, M., Dalla Chiara, B., Defiorio, F., et al.: Wireless sensor networks for traffic monitoring in a logistics centre. Transp. Res. Part C Emerg. Technol. 26, 99–124 (2013)

    Article  Google Scholar 

  7. Ramesh, M.: Design, development, and deployment of a wireless sensor network for detection of landslides. Ad Hoc Netw. 13, 2–18 (2012)

    Article  Google Scholar 

  8. Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M., et al.: An efficient broadcast authentication scheme in wireless sensor networks. In Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS’06, pp. 311–320 (2006)

  9. Lee, J., Kim, S., Cho, Y., Chung, Y., Park, Y., et al.: HORSIC: an efficient one-time signaturescheme for wireless sensor networks. Inf. Process. Lett. 112(20), 783–787 (2012)

    Article  Google Scholar 

  10. Turkanovi’c, M., Hlbl, M., et al.: Notes on a temporal-credential-based mutual authentication and key agreement scheme for wireless sensornetworks. Wirel. Pers. Commun. 77(2), 907–922 (2013)

    Article  Google Scholar 

  11. Hongbin, M., Yingli, W., Shuang, Y., et al.: Hybrid keymanagement mechanism based on double cluster head structure, 2nd International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), IEEE, pp. 1164–1167, (2012)

  12. Fan, Y., et al.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Commun. Syts. 36(1), 316–323 (2012)

    Google Scholar 

  13. Wong, K.H.M., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1, p. 8–17 (2006)

  14. Das, A.K., et al.: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5), 1646–1656 (2012)

    Article  Google Scholar 

  15. Odelu V, Das A.K., Alghathbar and Khan et al.: A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Secur. Commun. Netw. (2011)

  16. Chen, T., Shih, W.: A robust mutual authentication protocol for wireless sensor networks. Etri J. 32(5), 704–712 (2012)

    Article  Google Scholar 

  17. Jiang, Q., J. Ma., Lu, X., Tian, Y. et al.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. (2014)

  18. Chun, C., Daojing, H., Sammy, C., Jiajun, B., Yi, G., Rong, F.: Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3), 347–62 (2014)

    Article  Google Scholar 

  19. Amin, R., Biswas, G.P., et al.: A novel user authentication and key agreement protocol for accessing multi medical server usable in TMIS. J. Med. Syst. 39(3), 33 (2015)

    Article  Google Scholar 

  20. Shim, K.-A., Lee, Y.-R., Park, C.-M.: EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)

    Article  Google Scholar 

  21. Benzaid, C., Saiah, A., Badache, N.: An enhanced secure pairwise broadcast time synchronization protocol in wireless sensor networks. In Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed, and Network based Processing, PDP’2014, pp. 569–573 (2014)

  22. Varatharajan, R., Manogaran, G., Priyan, M.K., Sundarasekar, R.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput. 1, 1–10 (2017)

    Google Scholar 

  23. Varatharajan, R., Manogaran, G., Priyan, M.K., Balaş, V.E., Barna, C.: Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed. Tools Appl. 1, 1–21 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayush Sogani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sogani, A., Jain, A. Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks. Cluster Comput 22 (Suppl 5), 10637–10648 (2019). https://doi.org/10.1007/s10586-017-1151-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1151-6

Keywords

Navigation