A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using Block Cipher Algorithm Based on IoT

  • Qian WangEmail author
  • Wenxia Chen
  • Lei Wang


Aiming at the problem that mobile nodes in Wireless Sensor Network (WSN) lack credibility verification, a Sink node trusted access authentication protocol using packet cipher algorithm for mobile WSN is proposed based on the Internet of Things (IoT) environment. Firstly, the mobile Sink node is utilized to authenticate the sensor node and verify the platform’s credibility of the mobile node. Secondly, pre-stored pseudonyms and corresponding public and private keys of mobile nodes are utilized to realize the anonymity of mobile nodes, and the security proof is given under CK (Canetti-Krawczyk) model. Finally, the block cipher algorithm is introduced, and the advantages of the two algorithms are fused. The correctness and security of the proposed protocol have been proved by the verification experiments. In addition, compared with other authentication protocols, the proposed protocol has lower communication overhead.


Internet of Things (IoT) Trusted access authentication protocol Wireless Sensor Network (WSN) Mobile Sink nodes CK security model Block cipher algorithm 



The study was supported by The Key Scientific and Technological Project of Henan Province (No.182102210601) and The Key Scientific and Technological Project of Henan Province (No.152102310382).


  1. 1.
    J. Ying and K. Pahlavan, Precision of RSS-based localization in the IoT, International Journal of Wireless Information Networks, Vol. 26, No. 1, pp. 10–23, 2019.CrossRefGoogle Scholar
  2. 2.
    A. Beghriche and A. Bilami, A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks, International Journal of Intelligent Computing & Cybernetics, Vol. 11, No. 2, pp. 309–340, 2018.CrossRefGoogle Scholar
  3. 3.
    M. Parameswari and M. B. Moses, Efficient analysis of water quality measurement reporting system using IOT based system in WSN, Cluster Computing, Vol. 2, pp. 1–9, 2018.Google Scholar
  4. 4.
    Y. Yang, M. I. Fonoage and M. Cardei, Improving network lifetime with mobile wireless sensor networks, Computer Communications, Vol. 33, No. 4, pp. 409–419, 2010.CrossRefGoogle Scholar
  5. 5.
    R. Amin, S. H. Islam, P. Vijayakumar, et al., A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication, Multimedia Tools & Applications, Vol. 77, No. 9, pp. 11041–11066, 2018.CrossRefGoogle Scholar
  6. 6.
    Q. Jiang, S. Zeadally, J. Ma, et al., Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks, IEEE Access, Vol. 5, pp. 3376–3392, 2017.CrossRefGoogle Scholar
  7. 7.
    L. M. Wang, S. R. Jiang and Y. B. Guo, Composable-secure authentication protocol for mobile sensors roaming in the Internet of things, Science China Information Sciences, Vol. 42, No. 7, pp. 815–830, 2016.Google Scholar
  8. 8.
    Z. Y. Wei and Y. Bo, Provable secure authentication protocol with direct anonymity for mobile nodes roaming service in internet of things, Journal of Software, Vol. 26, No. 9, pp. 243–245, 2015. (in Chinese).MathSciNetGoogle Scholar
  9. 9.
    M. L. Das, Two-factor user authentication in wireless sensor networks, IEEE Transactions on wireless Communications, Vol. 8, No. 3, pp. 186–190, 2017.Google Scholar
  10. 10.
    T. H. Chen and W. K. Shih, A robust mutual authentication protocol for wireless sensor networks, ETRI Journal, Vol. 32, No. 5, pp. 704–712, 2017.MathSciNetCrossRefGoogle Scholar
  11. 11.
    D. He, S. Zeadally, N. Kumar, et al., Anonymous authentication for wireless body area networks with provable security, IEEE Systems Journal, Vol. PP, No. 99, pp. 1–12, 2017.Google Scholar
  12. 12.
    T. Li, M. Xia, J. Chen, et al., Automated water quality survey and evaluation using an IoT platform with mobile sensor nodes, Sensors, Vol. 17, No. 8, p. 1735, 2017.CrossRefGoogle Scholar
  13. 13.
    M. Z. M. Z. Harith, N. M. Noor, M. Y. I. Idris, et al., Intersection and complement set (IACS) method to reduce redundant node in mobile WSN localization, Sensors, Vol. 18, No. 7, p. 2344, 2018.CrossRefGoogle Scholar
  14. 14.
    X. Wu, Y. Wang and W. Han, Time synchronization for wireless sensor networks with a mobile node, Ad Hoc & Sensor Wireless Networks, Vol. 36, No. 42739, pp. 175–191, 2017.Google Scholar
  15. 15.
    S. Rashed and M. Soyturk, Analyzing the effects of UAV mobility patterns on data collection in wireless sensor networks, Sensors, Vol. 17, No. 2, pp. 74–79, 2017.CrossRefGoogle Scholar
  16. 16.
    T. D. This, Congestion detection and alleviation in multihop wireless sensor networks, Wireless Communications & Mobile Computing, pp. 1–13, 2017.Google Scholar
  17. 17.
    X. J. Tong, W. Zhu, L. Yang, et al., A novel compound chaotic block cipher for wireless sensor networks, Communications in Nonlinear Science & Numerical Simulation, Vol. 22, No. 1–3, pp. 120–133, 2015.CrossRefGoogle Scholar
  18. 18.
    R. S. M. Joshitta and L. Arockiam, A novel block cipher for enhancing data security in healthcare internet of things, Journal of Physics Conference Series, Vol. 1142, No. 1, p. 012002, 2018.CrossRefGoogle Scholar
  19. 19.
    L. Lang, B. Liu and W. Hui, QTL: a new ultra-lightweight block cipher, Microprocessors & Microsystems, Vol. 45, pp. 45–55, 2016.CrossRefGoogle Scholar
  20. 20.
    Y. Dai and S. Chen, Security analysis of Khudra: a lightweight block cipher for FPGAs, Security and Communication Networks, Vol. 9, No. 10, pp. 1173–1185, 2016.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.College of Computer Science and TechnologyZhoukou Normal UniversityZhoukouChina
  2. 2.Zhoukou Senior Technical SchoolZhoukouChina
  3. 3.Center of Information Development and ManagementSoochow UniversitySuzhouChina

Personalised recommendations