A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility
by Sarmad Ullah Khan; Claudio Pastrone; Luciano Lavagno; Maurizio A. Spirito
International Journal of Internet Technology and Secured Transactions (IJITST), Vol. 4, No. 2/3, 2012

Abstract: In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the research community because their flexibility, adaptability and self-organising properties make them a technology solution suitable for diverse application scenarios ranging from home and industrial automation to military surveillance. Since these networks consist of resource constrained devices and can be deployed in remote and unattended areas, supporting security could represent a challenging task especially if mobility scenarios are taken into consideration. In this context, key management facilitates the adoption of cryptography techniques to support secure data communication and to protect the resource constrained devices from various security attacks. This paper specifically focuses on mobile heterogeneous wireless sensor networks consisting of mobile sensor nodes with few fixed sensor nodes and presents a mutual authentication and key management scheme suitable for the considered scenario. Analytical and OMNET++ simulation results show that the proposed scheme provides better network connectivity, consumes less memory, has better network resilience against attacks and introduces lower communication overhead compared to state-of-the-art solutions.

Online publication date: Sat, 09-Aug-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Technology and Secured Transactions (IJITST):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com