Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networks
Authenticated Key Exchange is one of the prominent security requirement of wireless sensor networks (WSNs) to reduce the possibility of various security attacks. In this paper, we propose symmetric hash function and bloom filter based secure authenticated key exchange (AKE) protocol for WSNs. The pr...
Saved in:
Published in: | 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) pp. 1 - 6 |
---|---|
Main Authors: | , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-12-2017
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Authenticated Key Exchange is one of the prominent security requirement of wireless sensor networks (WSNs) to reduce the possibility of various security attacks. In this paper, we propose symmetric hash function and bloom filter based secure authenticated key exchange (AKE) protocol for WSNs. The proposed protocol is appropriate for authentication of the users without pre-alignment between the test and the registered minutia points of the fingerprint for multi-hop WSNs. The proposed protocol eliminates unauthorized query information circulation at the initial level (i.e., at the sensor node itself) to prevent bogus information flooding from the sensor nodes to the gateway node. We show that the proposed protocol resists the resource exhaustion attacks associated with WSNs of large hop count (i.e., a large number of intermediary sensor nodes through which information must pass between source sensor node and the trusted gateway node). We present both the formal and informal security analysis of the proposed protocol using AVISPA tool and basic cryptography concepts. The analysis of computational overhead demonstrates that our proposed protocol is preferable for resource-constrained sensor motes like MicaZ. The security analysis and performance evaluation reveal that the proposed protocol is more secure, effective and resilient in comparison to other existing protocols. |
---|---|
AbstractList | Authenticated Key Exchange is one of the prominent security requirement of wireless sensor networks (WSNs) to reduce the possibility of various security attacks. In this paper, we propose symmetric hash function and bloom filter based secure authenticated key exchange (AKE) protocol for WSNs. The proposed protocol is appropriate for authentication of the users without pre-alignment between the test and the registered minutia points of the fingerprint for multi-hop WSNs. The proposed protocol eliminates unauthorized query information circulation at the initial level (i.e., at the sensor node itself) to prevent bogus information flooding from the sensor nodes to the gateway node. We show that the proposed protocol resists the resource exhaustion attacks associated with WSNs of large hop count (i.e., a large number of intermediary sensor nodes through which information must pass between source sensor node and the trusted gateway node). We present both the formal and informal security analysis of the proposed protocol using AVISPA tool and basic cryptography concepts. The analysis of computational overhead demonstrates that our proposed protocol is preferable for resource-constrained sensor motes like MicaZ. The security analysis and performance evaluation reveal that the proposed protocol is more secure, effective and resilient in comparison to other existing protocols. |
Author | Sastry, V.N. Maurya, Anup Kumar |
Author_xml | – sequence: 1 givenname: Anup Kumar surname: Maurya fullname: Maurya, Anup Kumar organization: Center for Mobile Banking, Institute for Development and Research in Banking Technology, Hyderabad, India – sequence: 2 givenname: V.N. surname: Sastry fullname: Sastry, V.N. organization: Center for Mobile Banking, Institute for Development and Research in Banking Technology, Hyderabad, India |
BookMark | eNotkE1OwzAYRI0EErT0AIiNL5DgvyT2sqqAIlWwaPeVY38mpo2DbEeltyeIrt6MNHqLmaHrMARA6IGSklKinpbvu23JCG1KyaWglbxCM1pxWTMuGnqLFil9EUJYLTlV4g7l7bnvIUdvcKdTh90YTPZDwK1OYHECM0bAOlgMznnjIWSsx9xN9EbnaXKAM4Yf0-nwCbiHv-BTj90Q8clHOEJKkyakqQfIpyEe0j26cfqYYHHhHO1ennerdbH5eH1bLTeFVyQXtnKGANFQE9Fo2lhVt04Yq7RgpAFlq5aKRjIOorItM4ZYw4RULbhKi1bwOXr813oA2H9H3-t43l9-4b8N415- |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ANTS.2017.8384158 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1538623471 9781538623473 |
EndPage | 6 |
ExternalDocumentID | 8384158 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IL 6IN AAJGR ABLEC ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-d5fc0e0ae6047a17d96bf4cd9a4207e9d5b147823e45db2cc0dc2489bef5a4b43 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:39:30 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-d5fc0e0ae6047a17d96bf4cd9a4207e9d5b147823e45db2cc0dc2489bef5a4b43 |
PageCount | 6 |
ParticipantIDs | ieee_primary_8384158 |
PublicationCentury | 2000 |
PublicationDate | 2017-Dec. |
PublicationDateYYYYMMDD | 2017-12-01 |
PublicationDate_xml | – month: 12 year: 2017 text: 2017-Dec. |
PublicationDecade | 2010 |
PublicationTitle | 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) |
PublicationTitleAbbrev | ANTS |
PublicationYear | 2017 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0002683194 |
Score | 1.7026602 |
Snippet | Authenticated Key Exchange is one of the prominent security requirement of wireless sensor networks (WSNs) to reduce the possibility of various security... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Authentication Logic gates Password Protocols Smart cards Wireless sensor networks |
Title | Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networks |
URI | https://ieeexplore.ieee.org/document/8384158 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELUoEyx8tIhveWAkrRM7sT0iaNWpQmoHtsr2XdRKJEUkleDfYydRAYmFzYmUWDoneZfze-8IubOpSbXKXRQ7C5HIOYuU_7WNBAL49MhAAqHeMZ3L2Yt6GgebnPudFgYRG_IZDsOw2cuHjduGUtlIceXxRvVIT2rVarV29ZQkU_5pEt3GZcz06GG2mAfulhx21_1qoNLgx-TofzMfk8G3EI8-7yDmhOxheUoOf3gI9kk9_yyK0BbL0ZWpVjQAVQg2DfgEtAr1dKSmBIqNW4Sfh5pAay_rRv4G1L_GFD9aBTAtMAzWVUF9NkuDkfGr_xb625SVPy5b0ng1IIvJePE4jbpWCtFaszqCNHcMmcGMCWliCTqzuXCgjUiYRA2pjYXPFTiKFGziHAOXCKUt5qkRVvAzsl9uSjwnFLngaDMLRlvh8uDubmLDZS6lZJZnF6Qfwrd8a80yll3kLv8-fUUOwgq1_JBrsl-_b_GG9CrY3jbL-wUW8KsN |
link.rule.ids | 310,311,782,786,791,792,798,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT4MwFG50HtSLPzbjb3vwKFuBQsvR6JYZ52IyDt6Wtu-RLXHMCEv0v7cFMjXx4q2QQJNX4Hu8ft_3CLnWkYoSmRnPNxo8noXMk_bX1uMIYNMjBQG4esdwIsYv8r7vbHJu1loYRKzIZ9h1w2ovH5Zm5UplPRlKizdyk2xFXMSiVmutKypBLO3zxJutS58lvdtxOnHsLdFtrvzVQqVCkMHe_-beJ51vKR59XoPMAdnA_JDs_nARbJNy8rlYuMZYhs5UMaMOqly4qUMooIWrqCNVOVCs_CLsPFQ5YnteVgI4oPZFpvhRa4DpAt1gXiyozWepszJ-tV9De5u8sMd5TRsvOiQd9NO7odc0U_DmCSs9iDLDkCmMGRfKF5DEOuMGEsUDJjCBSPvcZgsh8gh0YAwDE3CZaMwixTUPj0grX-Z4TCiGPEQda1CJ5iZz_u7KV6HIhBBMh_EJabvwTd9qu4xpE7nTv09fke1h-jSajh7Gj2dkx61WzRY5J63yfYUXZLOA1WW11F8_vK5e |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+IEEE+International+Conference+on+Advanced+Networks+and+Telecommunications+Systems+%28ANTS%29&rft.atitle=Symmetric+hash+function+based+secure+and+efficient+authenticated+key+exchange+mechanism+for+wireless+sensor+networks&rft.au=Maurya%2C+Anup+Kumar&rft.au=Sastry%2C+V.N.&rft.date=2017-12-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FANTS.2017.8384158&rft.externalDocID=8384158 |