Abstract
Broadcast authentication is the base of network security in WSN (Wireless Sensor Network) due to versatility task and limited energy. The symmetric encryption has been widely used in WSN because of its high energy efficiency, but the network is vulnerable to DoS (Denial of Service) attacks on account of time delay during the authentication. An accelerated signature mechanism AvBNN-IBS (Accelerated vBNN-IBS), focus on the fix-deployed WSN, through the way of mutual cooperation between nodes is put forward in this paper to solve the problems of low calculation speed and complex algorithm of public key encryption mechanisms. Compared with the traditional authentication mechanisms, the scheme proposed could effectively lower the energy consumption and authentication time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Snasel, V., Kong, L.: Sink node placement strategies based on cat swarm optimization algorithm. J. Netw. Intell. 1(2), 52–60 (2016)
Li, J.-P., Dong, Z.-Q.: Uneven clustering and data transmission strategy for energy hole problem in wireless sensor networks. J. Inf. Hiding Multimedia Signal Process. 8(2), 500–509 (2017)
Perrg, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. ACM Wireless Netw. 8, 521–534 (2002)
Mansouri, D., Mokdad, L., Ben-othman, J., Ioualalen, M.: Detecting DoS attacks in WSN based on clustering technique. In: 2013 IEEE Wireless Communication and Networking Conference (WCNC), pp. 2214–2219 (2013)
Kim, D., An, S.: PKC-based DoS attacks-resistant scheme in wireless sensor networks. IEEE Sens. J. 16, 2217–2218 (2016)
Kodali, R.K: Implementation of ECDSA in WSN. In: 2013 International Conference on Control Communication and Computing (ICCC), pp. 310–314 (2013)
Saqib, N., Iqbal, U.: Security in wireless sensor networks using ECC. In: 2016 IEEE International Conference on Advances in Computer Applications (ICACA), pp. 270–274 (2016)
Singh, L.D., Singh, K.M.: Implementation of text encryption using elliptic curve cryptography. Procedia Comput. Sci. 54, 73–82 (2015)
Yusof, Y.M., Muzahidul Islam, A.K.M., Baharum, S.: An experimental study of WSN transmission power optimization using MICAz motes. In: 2015 International Conference on Advances in Electrical Engineering (ICAEE), pp. 182–185 (2015)
Lu, X., Cen, J., Zhang, X.: Node state optimization based coverage control algorithm for wireless sensor networks. In: 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference, pp. 163–166 (2014)
Acknowledgement
This work was supported by the National Natural Science Foundation of China under Grant No. 61302074, 61571181, Natural Science Foundation of Heilongjiang Province under Grant No. QC2013C061, Modern Sensor Technology Research and Innovation Team Foundation of Heilongjiang Province under Grant No. 2012TD007, and Postdoctoral Research Foundation of Heilongjiang Province under Grant No. LBH-Q15121.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Qin, D., Zhang, Y., Ma, J., Yang, S., Wang, E. (2018). Accelerated vBNN–IBS Authentication Scheme for WSN. In: Pan, JS., Tsai, PW., Watada, J., Jain, L. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2017. Smart Innovation, Systems and Technologies, vol 82. Springer, Cham. https://doi.org/10.1007/978-3-319-63859-1_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-63859-1_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63858-4
Online ISBN: 978-3-319-63859-1
eBook Packages: EngineeringEngineering (R0)