Online citations, reference lists, and bibliographies.
← Back to Search

An Efficient And Adaptive Mutual Authentication Framework For Heterogeneous Wireless Sensor Network-Based Applications

P. Kumar, M. Ylianttila, A. Gurtov, Sanggon Lee, Hoon-Jae Lee
Published 2014 · Engineering, Medicine, Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.
This paper references
10.1109/SAHCN.2009.5168981
Traffic-Aware Relay Node Deployment for Data Collection in Wireless Sensor Networks
F. Wang (2009)
A Survey on Clustering Algorithms for Heterogeneous Wireless Sensor Networks
V. Katiyar (2011)
10.1016/j.comnet.2010.05.011
The price of security in wireless sensor networks
Jongdeog Lee (2010)
10.1145/1869983.1869997
Evolution and sustainability of a wildlife monitoring sensor network
Vladimir Dyo (2010)
10.1145/948109.948118
A pairwise key pre-distribution scheme for wireless sensor networks
W. Du (2003)
10.1007/s11227-008-0184-2
Scalable and efficient key management for heterogeneous sensor networks
F. Kausar (2008)
10.1109/TSG.2011.2166280
Smart “Stick-on” Sensors for the Smart Grid
R. Moghe (2012)
10.1109/TPDS.2006.106
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
M. Younis (2006)
10.1109/TC.2007.70774
Energy-Efficient Multihop Polling in Clusters of Two-Layered Heterogeneous Sensor Networks
Z. Zhang (2008)
10.1016/j.jss.2011.10.049
An efficient and secure multi-server authentication scheme with key agreement
W. Tsaur (2012)
10.1109/TCE.2012.6227438
Resource and service management architecture of a low capacity network for smart spaces
S. Bhardwaj (2012)
10.1155/2011/893592
Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks
R. Azarderakhsh (2011)
10.1016/j.adhoc.2004.08.012
Group key management scheme for large-scale sensor networks
M. Eltoweissy (2005)
Medical emergency detection in sensor networks
J Ko (2010)
10.1002/cpe.3311
Secure random number generation in wireless sensor networks
G. Re (2015)
10.1109/TCE.2009.5174412
Enhanced novel access control protocol over wireless sensor networks
Hyun-Sung Kim (2009)
10.1109/TWC.2012.032812.110433
PKC Based Broadcast Authentication using Signature Amortization for WSNs
Y. Liu (2012)
Access control in wireless sensor networks
Zinaida Benenson (2008)
Zero Knowledge Protocol to design Security Model for threats in WSN
S. Aghav (2012)
10.1016/s0026-0657(08)70101-2
Available Online at
Kam Shadan (1600)
10.1145/1105688.1105691
Improving key predistribution with deployment knowledge in static sensor networks
D. Liu (2005)
10.1109/JSAC.2009.090505
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
Y. Huang (2009)
10.1109/ICC.2008.319
Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks
Xiaojiang Du (2008)
Authentication and Authorization Mechanisms for substation automation in smart grid networks
B. Vaidya (2013)
Random Key Pre-distribution Scheme for Sensor Networks
H. Chen (2003)
10.1109/GLOCOM.2007.191
An Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution Scheme
Jeremy Brown (2007)
10.1145/1814539.1814540
Introduction to special issue on Java technologies for real-time and embedded systems
M. T. Higuera-Toledano (2010)
A novel access control for secure sensor networks
H. F. Huang (2009)
10.1145/586110.586117
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
10.1109/MSN.2009.26
A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain
B. Tian (2009)
10.1109/MNET.2013.6423185
Authentication and authorization mechanisms for substation automation in smart grid network
B. Vaidya (2013)
10.1109/CEC.2007.4424955
AIS for misbehavior detection in wireless sensor networks: Performance and design principles
M. Drozda (2007)
A Two-Tiered Architecture for Real-Time Communications in Large-Scale Wireless Sensor Networks: Research Challenges
A. Koubaa (2005)
10.1016/j.csi.2008.05.014
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
A Location-Aware Scheme for the Key Establishment in Wireless Sensor Networks. Available online: http://cse.iitkgp.ac.in/~abhij/ publications/t-nbd-06.pdf (accessed on
A. K. Das (2013)
10.1061/40878(202)5
Wireless Sensor Networks for Structural Health Monitoring: A Multi-Scale Approach
T. Kijewski-Correa (2006)
10.1109/MWC.2007.4396946
Key management issues in wireless sensor networks: current proposals and future developments
J. Lee (2007)
10.5296/npa.v3i1.580
Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey
G. Zhao (2011)
10.1504/IJSNET.2006.010834
Efficient anonymity schemes for clustered wireless sensor networks
S. Misra (2006)
10.1109/ISCC.2003.1214142
A low-energy key management protocol for wireless sensor networks
G. Jolly (2003)
10.1145/1814539.1814550
MEDiSN: Medical emergency detection in sensor networks
Jeonggil Ko (2010)
An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Sensor Networks
A. K. Das (2009)
10.1145/74850.74852
A logic of authentication
M. Burrows (1989)
A Location-Aware Scheme for the Key Establishment in Wireless Sensor Networks. Available online
A K Das (2013)
10.1515/JMC.2008.018
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
Maura B. Paterson (2008)
10.1007/11814856_48
On Broadcast Authentication in Wireless Sensor Networks
K. Ren (2007)
10.3390/s111211544
Heterogeneous Collaborative Sensor Network for Electrical Management of an Automated House with PV Energy
Manuel Castillo-Cagigal (2011)
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1155/2012/820716
A Wireless Sensor Network for Precise Volatile Organic Compound Monitoring
G. Manes (2012)
10.1145/1134680.1134683
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
P. Traynor (2007)
10.1016/j.adhoc.2006.05.011
An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
Yi Cheng (2007)
Available online: http://www.openautomation.net/uploadsproductos/ micaz_datasheet.pdf (accessed on 15
Micaz Datasheet (2013)
10.1109/TWC.2008.060603
A framework for a distributed key management scheme in heterogeneous wireless sensor networks
K. Lu (2008)
10.1109/TCE.2010.5505971
On the security of an enhanced novel access control protocol for wireless sensor networks
P. Zeng (2010)
10.1007/978-0-387-09441-0_11
HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks
B. Maala (2008)
10.1109/ICNSC.2008.4525442
Transparent Heterogeneous Networks for Remote Control of Home Environments
K. Gill (2008)
10.1016/j.adhoc.2006.05.012
An effective key management scheme for heterogeneous sensor networks
Xiaojiang Du (2007)
10.3390/s120100055
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
P. Kumar (2012)
10.1016/j.adhoc.2006.05.014
Access control in wireless sensor networks
Yun Zhou (2007)
10.1007/978-3-642-03829-7_10
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks
J. López (2009)
A LocationAware Scheme for the Key Establishment in Wireless Sensor Networks
A. K. Das
10.1016/j.adhoc.2010.08.011
SAKE: Software attestation for key establishment in sensor networks
Arvind Seshadri (2011)
TinySec: A Secure Link Layer Security Architecture for Wireless Sensor Networks
C. Karloff (2004)
Available online: http://platformx.sourceforge.net/home
Stargate System
10.1007/S11071-012-0652-3
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
C. Lee (2013)
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license
10.1155/2012/317020
Continuous Remote Monitoring in Hazardous Sites Using Sensor Technologies
G. Manes (2012)
10.1007/s11235-008-9099-8
Coverage based inter cluster communication for load balancing in heterogeneous wireless sensor networks
N. Israr (2008)



This paper is referenced by
10.1109/JIOT.2016.2600630
An IoT-Based Online Monitoring System for Continuous Steel Casting
F. Zhang (2016)
10.3390/s16101711
Performance Analysis of Integrated Wireless Sensor and Multibeam Satellite Networks Under Terrestrial Interference
Hongjun Li (2016)
10.17586/2226-1494-2016-16-3-467-473
Availability research of remote devices for wireless networks
Н А Бажаев (2016)
SDU International Technologic Science
A. Çalhan (2015)
10.1109/JSYST.2018.2866067
Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
Y. K. Ever (2019)
10.1007/978-3-319-23126-6_1
The Monitoring of Information Security of Remote Devices of Wireless Networks
Ilya Lebedev (2015)
Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
Yoney Kirsal Ever (2019)
10.1109/ICAICT.2015.7338553
Monitoring of the Information Security of Wireless remote devices
Nurzhan Bazhayev (2015)
10.3390/s16020252
A Secure Scheme for Distributed Consensus Estimation against Data Falsification in Heterogeneous Wireless Sensor Networks
Shichao Mi (2016)
10.1007/978-3-319-46301-8_42
The Analysis of Abnormal Behavior of the System Local Segment on the Basis of Statistical Data Obtained from the Network Infrastructure Monitoring
I. Lebedev (2016)
10.1155/2016/3815834
A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks
Tianshu Wang (2016)
10.1007/978-3-319-33936-8_23
Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network
I. Krivtsova (2016)
10.3103/S0146411617080223
Modeling of information influence on remote wireless network devices
Mikhail E. Sukhoparov (2017)
NETWORKING ( NET ) Professor
S. Glisic (2015)
10.3390/s150305763
DCPVP: Distributed Clustering Protocol Using Voting and Priority for Wireless Sensor Networks
Hooman Hematkhah (2015)
10.1007/s11227-018-2693-y
A trust enhancement scheme for cluster-based wireless sensor networks
Tianshu Wang (2018)
10.1057/s41284-019-00211-8
A systematic review of crime facilitated by the consumer Internet of Things
John M. Blythe (2019)
10.1109/ICAICT.2016.7991834
Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments
Mikhail E. Sukhoparov (2016)
10.1109/FRUCT-ISPIT.2016.7561504
Research availability of devices based on wireless networks
Nurzhan Bazhayev (2016)
10.1051/MATECCONF/201713900185
Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network
W. Feng (2017)
10.1007/s40860-018-0062-5
Multi-factor user authentication scheme for IoT-based healthcare services
P. Dhillon (2018)
10.1109/ICAICT.2016.7991764
Evaluation of the available wireless remote devices subject to the information impact
Nurzhan Bazhayev (2016)
10.3390/s16040424
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks †
T. Hayajneh (2016)
10.1109/CC.2016.7513213
Cluster based secure dynamic keying technique for heterogeneous mobile Wireless Sensor Networks
V. Kesavan (2016)
Semantic Scholar Logo Some data provided by SemanticScholar