Title: Node authentication algorithm for securing static wireless sensor networks from node clone attack

Authors: Vandana Mohindru; Yashwant Singh

Addresses: Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan, 173234, India ' Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan, 173234, India

Abstract: Wireless sensor networks (WSN) consist of small size sensor nodes with limited sensing, processing, communication, and storage capabilities. These sensor nodes are vulnerable to the node clone attack where the attacker compromises the node and extracts secret information from the node and replicate the large numbers of clones of captured node throughout the sensor network. Therefore, providing security in such networks is of utmost importance. The main challenge to achieve this is to make the security solution energy efficient so that it is feasible to implement in such resource constrained nodes in WSN. In this paper, an energy efficient algorithm is proposed for node authentication. The aim of node authentication algorithm is to authenticate the sensor nodes before message communication within WSN so that cloned nodes are identified in the initial step of the communication. This algorithm uses encryption decryption operations and also XOR, extraction, bitwise shift operations. The performance of the proposed algorithm is analysed in terms of communication, storage, and computation overheads metrics. Finally, performance of the proposed algorithm is analysed with the other node authentication algorithms.

Keywords: wireless sensor network; WSN; security; encryption; authentication; node clone attack; network security; attacks; message communication; cryptography; energy efficient.

DOI: 10.1504/IJICS.2018.091462

International Journal of Information and Computer Security, 2018 Vol.10 No.2/3, pp.129 - 148

Received: 04 Feb 2017
Accepted: 03 Apr 2017

Published online: 01 May 2018 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article