Title: Mobile node authentication using key distribution scheme in wireless sensor networks

Authors: K. Shaila; S.H. Manjula; K.R. Venugopal; L.M. Patnaik

Addresses: Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore 560001, India ' Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore 560001, India ' University Visvesvaraya College of Engineering, Bangalore 560001, India ' Indian Institute of Science, Bangalore 560 012, India

Abstract: We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.

Keywords: DEV algorithm; EX-OR operation; mobile nodes; validation time; WSNs; wireless sensor networks; mobile node authentication; key distribution scheme; secure communications; network security; simulation; encryption; key management protocol; crytpography.

DOI: 10.1504/IJAHUC.2013.051376

International Journal of Ad Hoc and Ubiquitous Computing, 2013 Vol.12 No.1, pp.34 - 45

Received: 15 Sep 2011
Accepted: 09 Feb 2012

Published online: 14 Jan 2013 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article