Title :
Lightweight authentication protocol used in Wireless Sensor Network
Author :
Shah, Manali D. ; Gala, Shrenik N. ; Shekokar, Narendra M.
Author_Institution :
Dept. of Comput. Eng., D.J. Sanghvi Coll. of Eng., Mumbai, India
Abstract :
Indoor positioning system is implemented using sensors that use Wi-Fi triangulation to compute the position of a mobile device in a given area. This group of sensors placed in an unattended environment form a Wireless Sensor Network (WSN). These nodes in WSN are more vulnerable to passive and active attacks than wired sensors due to limitations in resources, unrestrained environments and their broadcasting nature. Security will be a significant factor in such applications where data integrity is most important. In this paper, a new and secure protocol based on number theory concepts and congruence equations has been introduced to provide authentication between the sensor nodes and Database Server in a Wireless Network. The proposed protocol uses Fermat Number Transform (FNT) and Chinese Remainder Theorem (CRT) to enable secure communication. The protocol will be using its own encryption and decryption algorithm to reduce the computational complexity involved in existing algorithms. It results in minimum memory utilization, instant authentication and it withstands Cloning attack, Replay attack, DoS attack and Man-in-the-middle attack. Comparison of the existing protocol with the proposed protocol is done on the basis of prevention of various attacks and memory efficiency.
Keywords :
computational complexity; cryptographic protocols; indoor radio; telecommunication security; wireless sensor networks; Chinese remainder theorem; DoS attack; Fermat number transform; WSN; Wi-Fi triangulation; attack prevention; authentication; broadcasting; cloning attack; computational complexity; database server; decryption algorithm; encryption algorithm; indoor positioning system; lightweight authentication protocol; man-in-the-middle attack; memory utilization; mobile device; replay attack; secure communication; secure protocol; sensor nodes; wireless sensor network; Authentication; Base stations; Databases; Protocols; Sensors; Servers; Wireless sensor networks; Authentication; Chinese Remainder Theorem; Encryption; Fermat Number Transform;
Conference_Titel :
Circuits, Systems, Communication and Information Technology Applications (CSCITA), 2014 International Conference on
Conference_Location :
Mumbai
DOI :
10.1109/CSCITA.2014.6839249