Advertisement

Accelerated vBNN–IBS Authentication Scheme for WSN

  • Danyang QinEmail author
  • Yan Zhang
  • Jingya Ma
  • Songxiang Yang
  • Erfu Wang
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 82)

Abstract

Broadcast authentication is the base of network security in WSN (Wireless Sensor Network) due to versatility task and limited energy. The symmetric encryption has been widely used in WSN because of its high energy efficiency, but the network is vulnerable to DoS (Denial of Service) attacks on account of time delay during the authentication. An accelerated signature mechanism AvBNN-IBS (Accelerated vBNN-IBS), focus on the fix-deployed WSN, through the way of mutual cooperation between nodes is put forward in this paper to solve the problems of low calculation speed and complex algorithm of public key encryption mechanisms. Compared with the traditional authentication mechanisms, the scheme proposed could effectively lower the energy consumption and authentication time.

Keywords

Digital signature Accelerated authentication Energy consumption Wireless Sensor Network 

Notes

Acknowledgement

This work was supported by the National Natural Science Foundation of China under Grant No. 61302074, 61571181, Natural Science Foundation of Heilongjiang Province under Grant No. QC2013C061, Modern Sensor Technology Research and Innovation Team Foundation of Heilongjiang Province under Grant No. 2012TD007, and Postdoctoral Research Foundation of Heilongjiang Province under Grant No. LBH-Q15121.

References

  1. 1.
    Snasel, V., Kong, L.: Sink node placement strategies based on cat swarm optimization algorithm. J. Netw. Intell. 1(2), 52–60 (2016)Google Scholar
  2. 2.
    Li, J.-P., Dong, Z.-Q.: Uneven clustering and data transmission strategy for energy hole problem in wireless sensor networks. J. Inf. Hiding Multimedia Signal Process. 8(2), 500–509 (2017)Google Scholar
  3. 3.
    Perrg, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. ACM Wireless Netw. 8, 521–534 (2002)CrossRefzbMATHGoogle Scholar
  4. 4.
    Mansouri, D., Mokdad, L., Ben-othman, J., Ioualalen, M.: Detecting DoS attacks in WSN based on clustering technique. In: 2013 IEEE Wireless Communication and Networking Conference (WCNC), pp. 2214–2219 (2013)Google Scholar
  5. 5.
    Kim, D., An, S.: PKC-based DoS attacks-resistant scheme in wireless sensor networks. IEEE Sens. J. 16, 2217–2218 (2016)CrossRefGoogle Scholar
  6. 6.
    Kodali, R.K: Implementation of ECDSA in WSN. In: 2013 International Conference on Control Communication and Computing (ICCC), pp. 310–314 (2013)Google Scholar
  7. 7.
    Saqib, N., Iqbal, U.: Security in wireless sensor networks using ECC. In: 2016 IEEE International Conference on Advances in Computer Applications (ICACA), pp. 270–274 (2016)Google Scholar
  8. 8.
    Singh, L.D., Singh, K.M.: Implementation of text encryption using elliptic curve cryptography. Procedia Comput. Sci. 54, 73–82 (2015)CrossRefGoogle Scholar
  9. 9.
    Yusof, Y.M., Muzahidul Islam, A.K.M., Baharum, S.: An experimental study of WSN transmission power optimization using MICAz motes. In: 2015 International Conference on Advances in Electrical Engineering (ICAEE), pp. 182–185 (2015)Google Scholar
  10. 10.
    Lu, X., Cen, J., Zhang, X.: Node state optimization based coverage control algorithm for wireless sensor networks. In: 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference, pp. 163–166 (2014)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Danyang Qin
    • 1
    Email author
  • Yan Zhang
    • 1
  • Jingya Ma
    • 1
  • Songxiang Yang
    • 1
  • Erfu Wang
    • 1
  1. 1.Key Lab of Electronic and Communication EngineeringHeilongjiang UniversityHarbinPeople’s Republic of China

Personalised recommendations