Skip to main content
Log in

Secure authentication and integrity techniques for randomized secured routing in WSN

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

As wireless sensor network is resource-constrained, reliability and security of broadcasted data become major issue in these types of network. In order to overcome security and integrity issues, a secure authentication and integrity technique is proposed. In this technique, shared keys are used for providing authentication. Here, mutual authentication technique allows the sender and recipient to share a common key matrix as an authentication key. Both sender and recipient chose a random noise matrix and verification is done based on hamming weight. To increase authentication and integrity, a hybrid offline and online signcryption technique is proposed which is a cryptographic method that satisfies both the function of digital signature and public key encryption in a logical single step. By simulation results, we show that the proposed technique provides security in terms of increased packet delivery ratio and reduced compromised communications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Fan, X., & Gong, G. (2012). Accelerating signature-based broadcast authentication for wireless sensor networks. Ad Hoc Networks, 10(4), 723–736.

  2. Shim, K.-A., Lee Y.-R., & Park, C.-M. (2013). EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks, 11(1), 182–189.

  3. Zhang, W., Liu, Y., Das, S. K., & De, P. (2008). Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach. Pervasive and Mobile Computing, 4(5), 658–680.

    Article  Google Scholar 

  4. Sicari, S., Griecob, L. A., Boggiab, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. The Journal of Systems and Software, 85(1), 152–166.

    Article  Google Scholar 

  5. Guermazi A., & Abid, M. (2011). An efficient key distribution scheme to secure data-centric routing protocols in hierarchical wireless sensor networks, 2nd International Conference on Ambient Systems, Networks and Technologies (ANT), Procedia Computer Science 5, pp. 208–215.

  6. Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.

    Article  Google Scholar 

  7. Su, W.-T., Chang, K.-M., & Kuo, Y.-H. (2007). eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Computer Networks, 51(4), 1151–1168.

    Article  MATH  Google Scholar 

  8. Coen-Porisini, A., & Sicari, S. (2012). Improving data quality using a cross layer protocol in wireless sensor networks. Computer Networks, 56(17), 3655–3665.

    Article  Google Scholar 

  9. Faigl, Z., Pellikka, J., Bokor, L., & Gurtov, A. (2013). Performance evaluation of current and emerging authentication schemes for future 3GPP network architectures. Computer Networks, 60(26), 60–74.

  10. Li, Z., & Gong, G. (2011). Computationally efficient mutual entity authentication in wireless sensor networks. Ad Hoc Networks, 9(2), 204–215.

  11. Ayday, E., & Fekri, F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks, 10(7), 1278–1290.

  12. Simplicio Jr, M. A., de Oliveira, B. T., Margi, C. B., Barreto, P. S. L. M., Carvalho T. C. M. B., & Näslund, M. (2013). Survey and comparison of message authentication solutions on wireless sensor networks. Ad Hoc Networks, 11(3), 1221–1236.

  13. Bhuse, V., Gupta, A., & Pidva, R. (2003). A distributed approach to security in sensornets. IEEE 58th Vehicular Technology Conference VTC.

  14. Sharma, R., Chaba, Y., & Singh, Y. (2010). An IPC key management scheme for wireless sensor network. 1st International Conference on Parallel, Distributed and Grid Computing (PDGC).

  15. Bhasker, L. (2014). Genetically derived secure cluster-based data aggregation in wireless sensor networks. Information Security, IET, 8(1), 1–7.

    Article  Google Scholar 

  16. Bagaa, M., Challal, Y., Ouadjaout, A., Lasla, N., & Badachea, N. (2012). Efficient data aggregation with in-network integrity control for WSN. Journal of Parallel Distribution and Computing, 72(10), 1157–1170.

    Article  Google Scholar 

  17. Li, F., & Xiong, P. (2013). Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sensors Journal, 13(10), 3677–3684.

  18. Jeong, G., Seo, Y.-H., & Yang, H. S. (2013). Impersonating-resilient dynamic key management for large-scale wireless sensor networks. Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks.

  19. Zhang, X., He, J., & Wei, Q. (2011). EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. Hindawi Publishing Corporation, EURASIP Journal on Wireless Communications and Networking.

  20. Gu, W., Dutta, N., Chellappan, S., & Bai, X. (2011). Providing end-to-end secure communications in wireless sensor networks. IEEE Transactions on Network and Service Management, 8(3), 205–218.

    Article  Google Scholar 

  21. Kim, J., Baek, J., & Shon, T. (2011). An efficient and scalable re-authentication protocol over wireless sensor network. IEEE Transactions on Consumer Electronics, 57(2), 516–522.

    Article  Google Scholar 

  22. Lu, R., Lin, X., Zhu, H., Liang, X., & Shen, X. (2012). BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 32–43.

    Article  Google Scholar 

  23. Sahingoz, O. K. (2013). Large scale wireless sensor networks with multi-level dynamic key management scheme. Journal of Systems Architecture, 59(9), 801–807.

    Article  Google Scholar 

  24. Senthil kumaran, U., & Ilango (2013). Key pre-distribution scheme for randomized secured routing in wireless sensor networks (WSN’S). Journal of Theoretical and Applied Information Technology, 51(1).

  25. Network Simulator http://www.isi.edu/nsnam/nam.

  26. He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  Google Scholar 

  27. He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1164–1175.

    Article  Google Scholar 

  28. Zhang, Y., Li, X., Yang, J., Liu, Y., Xiong, N., & Vasilakos, A. V. (2013). A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia Tools and Applications, 67(1), 97–117.

    Article  Google Scholar 

  29. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chena, Y., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.

    Article  Google Scholar 

  30. Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). SecCloud: Bridging secure storage and computation in cloud. IEEE 30th International Conference on Distributed Computing Systems Workshops (ICDCSW).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to U. Senthil kumaran.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Senthil kumaran, U., Ilango, P. Secure authentication and integrity techniques for randomized secured routing in WSN. Wireless Netw 21, 443–451 (2015). https://doi.org/10.1007/s11276-014-0792-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-014-0792-0

Keywords

Navigation