Title :
Secure and time efficient hash-based message authentication algorithm for wireless sensor networks
Author :
Al-Mashhadi, H.M. ; Abdul-Wahab, H.B. ; Hassan, R.F.
Author_Institution :
Comput. Sci. Dept., Univ. of Technol., Baghdad, Iraq
Abstract :
Wireless sensor networks (WSNs) are used in many applications to gather sensitive information which is then forwarded to an analysis center. Resource limitations have to be taken into account when designing a WSN infrastructure. Authentication in WSNs is critical, as they are often deployed unattended in hostile environments and must transmit information over unsecured mediums. However, the cost of performing cryptographic operations is an extremely limiting factor because sensor devices and related equipment are constrained by storage and computational ability. Hash functions are the most widespread among all Authentication primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (2AMD-160) which uses a famous structure of hash algorithm given by the MIT Laboratory for Computer Science and RSA Data Security, Inc. To demonstrate the effectiveness of 2AMD-160 in terms of security and execution time, we compare our approach with two methods namely, MD5 and SHA1 hash function algorithms. Simulation results demonstrate that the execution time and the security achieved by the proposed method are more effective than the MD5 and SHA1.
Keywords :
cryptographic protocols; data communication; digital signatures; file organisation; telecommunication security; wireless sensor networks; 2AMD-l60 hash algorithm; Computer Science and RSA Data Security Inc; MD5 hash function algorithm; MIT Laboratory; SHAl hash function algorithm; WSN infrastructure; digital signature; execution time; information transmission; multiple cryptographic scheme; sensitive information gathering; sensor device; time efficient hash-based message authentication algorithm; wireless sensor network security protocol; Algorithm design and analysis; Encryption; Manganese; Protocols; Registers; Simulation; Wireless sensor networks; Authentication; Wireless Sensor Network (WSN); digital signature; hash function; security;
Conference_Titel :
Computer & Information Technology (GSCIT), 2014 Global Summit on
Conference_Location :
Sousse
Print_ISBN :
978-1-4799-5626-5
DOI :
10.1109/GSCIT.2014.6970116