Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks

Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks

Anusha Vangala (Chaitanya Bharathi Institute of Technology, India), Sachi Pandey (Indian Institute of Technology, Roorkee, India), Pritee Parwekar (SRM Institute of Science and Technology, India) and Ikechi Augustine Ukaegbu (Nazarbayev University, Kazakhstan)
Copyright: © 2020 |Pages: 24
DOI: 10.4018/IJNCR.2020070103
OnDemand PDF Download:
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A wireless sensor network consists of a number of sensors laid out in a field with mobile sinks dynamically aggregating data from the nodes. Sensitive applications such as military environment require the sink to identify if a sensor that it visits is legitimate, and in turn, the sensor has to ensure that the sink is authenticated to access its sensitive data. For the system to intelligently learn the credentials of non-malicious sink and non-malicious sensors based on the dynamically observed data, four approaches using access control lists, authenticator tokens, message digests, and elliptic curve variant of RSA algorithm are proposed along with the formal logic for correctness. The experimented data is analysed using false acceptance rate, false rejection rate, precision, and curve analysis parameters. The approaches are further compared based on the attacks they are vulnerable to and execution time, ultimately concluding that exchange of message digests and elliptic curve RSA algorithm are more widely applicable.
Article Preview
Top

Introduction

A wireless sensor network consists of a field of sensors, a sink which moves in the field to collect data from the sensors and sends the consolidated data from the sensors to a base station. The base station can then process the data further according to the application. There may be multiple sinks deployed in the field. The sensors in the field are grouped in clusters with a cluster head (Akyildiz &Vuran, 2010). In a given area of interest, sensors belonging to different fields may be deployed. When a sink visits a sensor, it has to identify the ownership of the sensor and confirm that it belongs to the same field as the sink. The sensor also has to make sure that the sink that requests for data belongs to the same field. The exchange of data is initiated only when the confirmation of identities is positive for both the sensor and the sink. Once this authentication step is positively confirmed, sensor data is encrypted and transferred by the sink to the base station. If the confirmation is negative, the sink is not allowed to access the sensor data. During the transfer, sensor data placed in the sink should be protected from modification, either deliberately by an attacker or due to external environment factors. This requires an algorithm to ensure data integrity. This article experiments the various approaches that can be used to perform the authentication of sensors and sinks before any confidential data is transferred between them.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 11: 4 Issues (2022): Forthcoming, Available for Pre-Order
Volume 10: 4 Issues (2021): 1 Released, 3 Forthcoming
Volume 9: 4 Issues (2020)
Volume 8: 4 Issues (2019)
Volume 7: 4 Issues (2018)
Volume 6: 2 Issues (2017)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing