Title :
Secure neighbour authentication in wireless sensor networks
Author :
Norman, Jasmine ; Joseph, Paulraj
Author_Institution :
Vellore Inst. of Technol., Vellore, India
fDate :
Feb. 28 2011-March 3 2011
Abstract :
Applications of wireless sensor networks often include sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Lacking security services in the routing protocols, WSNs are vulnerable to many kinds of attacks. A secure routing in WSN must address several challenges: vulnerable wireless communication, highly resource-constrained senor nodes in terms of processing power, storage, and battery life, and the risk of physically captured. However, a few of existing routing protocols for WSNs have been designed with security as a goal. As sensors communicate in a multi-hop fashion, identification of secure neighbours in a mobile topology is critical for routing. Since these devices are resource constrained, we propose a secure neighbour authentication protocol based on a variant of HB, an authentication protocol for RFID devices. Simulation results show that the routing protocol SHLAODV is secure and energy efficient.
Keywords :
message authentication; radiofrequency identification; routing protocols; telecommunication network topology; telecommunication security; wireless sensor networks; RFID devices; SHLAODV routing protocol; mobile topology; resource-constrained senor nodes; secure neighbour authentication protocol; security services; vulnerable wireless communication; wireless sensor networks; Authentication; Routing; Routing protocols; Sensors; Wireless sensor networks; Authentication; HB+; Secure Routing; WSN;
Conference_Titel :
Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4577-0786-5
DOI :
10.1109/WIRELESSVITAE.2011.5940835