Skip to main content

Formally Validated Authentication Protocols for WSN

  • Conference paper
  • First Online:
Book cover Advances in Big Data and Cloud Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 750))

Abstract

Authentication is one of the most important cryptographic primitive for safe guarding network entities and data. Data communication within Wireless Sensor Network is primarily limited to Base to node and Node to Base Communication. Methods have been employed to authenticate data transmitted between Node to Base and Base to Node within a WSN. However, such existing methods are primarily based on symmetric cryptography thus providing less flexibility and practicality. Public key cryptography provides flexible and prudent methods for authentication but they are computationally intense making them impractical for WSN. However, ECC and its light weight implementation TinyECC offers high potential for developing computationally efficient security protocols for WSN. In this paper, a brief review of the existing authentication methods in WSN has been presented. Two improved protocols concerning Sink to Reduced Function Device (RFD) and RFD to Sink communication has been presented. The proposed protocol has been formally validated on Avispa. An experimental set up using MicaZ and TinyOS has been created to carry out the performance benchmarking of the proposed protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sanchez-Rosario, F.: A low consumption real time environmental monitoring system for smart cities based on ZigBee wireless sensor network. IEEE 978-1-4799-5344-8 (2015)

    Google Scholar 

  2. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), pp. 53–57

    Google Scholar 

  3. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  4. Menzes, B.: Network Security and Cryptography. Cengage Learning

    Google Scholar 

  5. Mallan, D.J., Welish, M., Smith, D.M.: Implementing public key infrastructure for sensor networks. Trans. Sens. Netw. 4

    Google Scholar 

  6. Gura, N., Patel, A., Wander, A.S., Eberle, H., Chang Shantz, S.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Cryptographic Hardware and Embedded Systems, vol. 3156, pp. 119–132. Springer

    Google Scholar 

  7. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocol for sensor networks. In: Proceedings of 7th International Conference on Mobile Networking And Computing, vol. 8(5), pp 189–199 (2001)

    Google Scholar 

  8. Karlof, C., Sastry, N., Wagner, D: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys, Baltimore, MD, USA, 3–5 Nov 2004, pp. 162–175. ACM

    Google Scholar 

  9. Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: a secure sensor network communication architecture. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN ′07) April 200747948810.1145/1236360.12364212-s2.0-3534889734

    Google Scholar 

  10. Mohd, A., Aslam, N., Robertson, W., Phillips, W.: C-sec: energy efficient link layer encryption protocol for wireless sensor networks. In: Proceedings of the 9th Consumer Communications and Networking Conference (CCNC ‘12). IEEE, Las Vegas, Nevada USA, pp. 219–223 (2012)

    Google Scholar 

  11. AVISPA Web tool.: Automated Validation of Internet Security Protocols and Applications, www.avispa-project.org, Last Accessed Jan 2018

  12. Levis, P., Gay, D.: TinyOS Programming. Cambridge University Press (2009)

    Google Scholar 

  13. Memsic: Xserve User Manual May (2007)

    Google Scholar 

  14. Liu, A., Ning et al., P.: Tiny ECC: a configurable library for elliptical curve cryptography in wireless sensor networks. In: 7th International Conference on Information Processing in Sensor Networks SPOTS Track, April 2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ummer Iqbal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Iqbal, U., Shafi, S. (2019). Formally Validated Authentication Protocols for WSN. In: Peter, J., Alavi, A., Javadi, B. (eds) Advances in Big Data and Cloud Computing. Advances in Intelligent Systems and Computing, vol 750. Springer, Singapore. https://doi.org/10.1007/978-981-13-1882-5_36

Download citation

Publish with us

Policies and ethics