Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networks

Authenticated Key Exchange is one of the prominent security requirement of wireless sensor networks (WSNs) to reduce the possibility of various security attacks. In this paper, we propose symmetric hash function and bloom filter based secure authenticated key exchange (AKE) protocol for WSNs. The pr...

Full description

Saved in:
Bibliographic Details
Published in:2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) pp. 1 - 6
Main Authors: Maurya, Anup Kumar, Sastry, V.N.
Format: Conference Proceeding
Language:English
Published: IEEE 01-12-2017
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Authenticated Key Exchange is one of the prominent security requirement of wireless sensor networks (WSNs) to reduce the possibility of various security attacks. In this paper, we propose symmetric hash function and bloom filter based secure authenticated key exchange (AKE) protocol for WSNs. The proposed protocol is appropriate for authentication of the users without pre-alignment between the test and the registered minutia points of the fingerprint for multi-hop WSNs. The proposed protocol eliminates unauthorized query information circulation at the initial level (i.e., at the sensor node itself) to prevent bogus information flooding from the sensor nodes to the gateway node. We show that the proposed protocol resists the resource exhaustion attacks associated with WSNs of large hop count (i.e., a large number of intermediary sensor nodes through which information must pass between source sensor node and the trusted gateway node). We present both the formal and informal security analysis of the proposed protocol using AVISPA tool and basic cryptography concepts. The analysis of computational overhead demonstrates that our proposed protocol is preferable for resource-constrained sensor motes like MicaZ. The security analysis and performance evaluation reveal that the proposed protocol is more secure, effective and resilient in comparison to other existing protocols.
AbstractList Authenticated Key Exchange is one of the prominent security requirement of wireless sensor networks (WSNs) to reduce the possibility of various security attacks. In this paper, we propose symmetric hash function and bloom filter based secure authenticated key exchange (AKE) protocol for WSNs. The proposed protocol is appropriate for authentication of the users without pre-alignment between the test and the registered minutia points of the fingerprint for multi-hop WSNs. The proposed protocol eliminates unauthorized query information circulation at the initial level (i.e., at the sensor node itself) to prevent bogus information flooding from the sensor nodes to the gateway node. We show that the proposed protocol resists the resource exhaustion attacks associated with WSNs of large hop count (i.e., a large number of intermediary sensor nodes through which information must pass between source sensor node and the trusted gateway node). We present both the formal and informal security analysis of the proposed protocol using AVISPA tool and basic cryptography concepts. The analysis of computational overhead demonstrates that our proposed protocol is preferable for resource-constrained sensor motes like MicaZ. The security analysis and performance evaluation reveal that the proposed protocol is more secure, effective and resilient in comparison to other existing protocols.
Author Sastry, V.N.
Maurya, Anup Kumar
Author_xml – sequence: 1
  givenname: Anup Kumar
  surname: Maurya
  fullname: Maurya, Anup Kumar
  organization: Center for Mobile Banking, Institute for Development and Research in Banking Technology, Hyderabad, India
– sequence: 2
  givenname: V.N.
  surname: Sastry
  fullname: Sastry, V.N.
  organization: Center for Mobile Banking, Institute for Development and Research in Banking Technology, Hyderabad, India
BookMark eNotkE1OwzAYRI0EErT0AIiNL5DgvyT2sqqAIlWwaPeVY38mpo2DbEeltyeIrt6MNHqLmaHrMARA6IGSklKinpbvu23JCG1KyaWglbxCM1pxWTMuGnqLFil9EUJYLTlV4g7l7bnvIUdvcKdTh90YTPZDwK1OYHECM0bAOlgMznnjIWSsx9xN9EbnaXKAM4Yf0-nwCbiHv-BTj90Q8clHOEJKkyakqQfIpyEe0j26cfqYYHHhHO1ennerdbH5eH1bLTeFVyQXtnKGANFQE9Fo2lhVt04Yq7RgpAFlq5aKRjIOorItM4ZYw4RULbhKi1bwOXr813oA2H9H3-t43l9-4b8N415-
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ANTS.2017.8384158
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1538623471
9781538623473
EndPage 6
ExternalDocumentID 8384158
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-d5fc0e0ae6047a17d96bf4cd9a4207e9d5b147823e45db2cc0dc2489bef5a4b43
IEDL.DBID RIE
IngestDate Thu Jun 29 18:39:30 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-d5fc0e0ae6047a17d96bf4cd9a4207e9d5b147823e45db2cc0dc2489bef5a4b43
PageCount 6
ParticipantIDs ieee_primary_8384158
PublicationCentury 2000
PublicationDate 2017-Dec.
PublicationDateYYYYMMDD 2017-12-01
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-Dec.
PublicationDecade 2010
PublicationTitle 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
PublicationTitleAbbrev ANTS
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002683194
Score 1.7026602
Snippet Authenticated Key Exchange is one of the prominent security requirement of wireless sensor networks (WSNs) to reduce the possibility of various security...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Authentication
Logic gates
Password
Protocols
Smart cards
Wireless sensor networks
Title Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networks
URI https://ieeexplore.ieee.org/document/8384158
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELUoEyx8tIhveWAkrRM7sT0iaNWpQmoHtsr2XdRKJEUkleDfYydRAYmFzYmUWDoneZfze-8IubOpSbXKXRQ7C5HIOYuU_7WNBAL49MhAAqHeMZ3L2Yt6GgebnPudFgYRG_IZDsOw2cuHjduGUtlIceXxRvVIT2rVarV29ZQkU_5pEt3GZcz06GG2mAfulhx21_1qoNLgx-TofzMfk8G3EI8-7yDmhOxheUoOf3gI9kk9_yyK0BbL0ZWpVjQAVQg2DfgEtAr1dKSmBIqNW4Sfh5pAay_rRv4G1L_GFD9aBTAtMAzWVUF9NkuDkfGr_xb625SVPy5b0ng1IIvJePE4jbpWCtFaszqCNHcMmcGMCWliCTqzuXCgjUiYRA2pjYXPFTiKFGziHAOXCKUt5qkRVvAzsl9uSjwnFLngaDMLRlvh8uDubmLDZS6lZJZnF6Qfwrd8a80yll3kLv8-fUUOwgq1_JBrsl-_b_GG9CrY3jbL-wUW8KsN
link.rule.ids 310,311,782,786,791,792,798,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT4MwFG50HtSLPzbjb3vwKFuBQsvR6JYZ52IyDt6Wtu-RLXHMCEv0v7cFMjXx4q2QQJNX4Hu8ft_3CLnWkYoSmRnPNxo8noXMk_bX1uMIYNMjBQG4esdwIsYv8r7vbHJu1loYRKzIZ9h1w2ovH5Zm5UplPRlKizdyk2xFXMSiVmutKypBLO3zxJutS58lvdtxOnHsLdFtrvzVQqVCkMHe_-beJ51vKR59XoPMAdnA_JDs_nARbJNy8rlYuMZYhs5UMaMOqly4qUMooIWrqCNVOVCs_CLsPFQ5YnteVgI4oPZFpvhRa4DpAt1gXiyozWepszJ-tV9De5u8sMd5TRsvOiQd9NO7odc0U_DmCSs9iDLDkCmMGRfKF5DEOuMGEsUDJjCBSPvcZgsh8gh0YAwDE3CZaMwixTUPj0grX-Z4TCiGPEQda1CJ5iZz_u7KV6HIhBBMh_EJabvwTd9qu4xpE7nTv09fke1h-jSajh7Gj2dkx61WzRY5J63yfYUXZLOA1WW11F8_vK5e
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+IEEE+International+Conference+on+Advanced+Networks+and+Telecommunications+Systems+%28ANTS%29&rft.atitle=Symmetric+hash+function+based+secure+and+efficient+authenticated+key+exchange+mechanism+for+wireless+sensor+networks&rft.au=Maurya%2C+Anup+Kumar&rft.au=Sastry%2C+V.N.&rft.date=2017-12-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FANTS.2017.8384158&rft.externalDocID=8384158