Title :
A Hierarchical Authentication Scheme in Wireless Sensor Networks
Author_Institution :
Dept. of Math. & Comput. Sci., Fayetteville State Univ., Fayetteville, NC, USA
Abstract :
A wireless sensor network (WSN) refers to a group of autonomous sensors capable of collecting environmental conditions such as temperature, humidity, and pressure. In addition, WSNs may be deployed in a risky region where sensor nodes are equipped to track suspicious targets and monitor harmful activities. In such scenarios, security is crucial and challenging. Such applications require top security, such as authentication, confidentiality, and integrity. In this paper, we focus on the authentication service in wireless senor network. Authentication is validity of entities and is considered the first line of defense against malicious attacks. With high security requirements, we assume sensor nodes are equipped with sufficient resources and are capable of performing advanced cryptographic operations. We propose a simple authentication protocol for wireless sensor networks based on distributed clustering and asymmetric cryptographic algorithms.
Keywords :
cryptographic protocols; pattern clustering; target tracking; telecommunication security; wireless sensor networks; WSN; asymmetric cryptographic algorithm; authentication protocol; distributed clustering; harmful activity monitoring; hierarchical authentication scheme; malicious attack; target tracking; wireless sensor network security; Authentication; Peer-to-peer computing; Protocols; Public key; Wireless sensor networks; Authentication; Cluster; Sensor Networks;
Conference_Titel :
Mobile Ad Hoc and Sensor Systems (MASS), 2014 IEEE 11th International Conference on
Conference_Location :
Philadelphia, PA
Print_ISBN :
978-1-4799-6035-4
DOI :
10.1109/MASS.2014.110