Title :
An Id-based Multiple Authentication scheme against attacks in wireless sensor networks
Author_Institution :
Dept. of Comput. Sci., Beijing Univ. of Posts & Telecommun., Beijing, China
fDate :
Oct. 30 2012-Nov. 1 2012
Abstract :
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. Therefore, WSN is venerable to various attacks. Among these attacks, the id-based attack such as node replication attacks and Sybil attacks are the most threatening. Hence, the security in WSNs presents a critical challenge for identity and data authentication. Although there are some recent approaches, most are resources-costing or constrained to some specific systems. Thus, in this paper, we present a novel authentication scheme to prevent these attacks. This Id-based Multiple Authentication (IMA) scheme bases upon the joint identity authentication and steganography to present a secure mechanism for data aggregation in WSNs. Simulations against above-mentioned attacks applying this scheme is presented and consequently show that the scheme can successfully authenticate the sensory data with high confidentiality.
Keywords :
cryptographic protocols; wireless sensor networks; attacks; id-based multiple authentication scheme; monitoring tasks; resource-constrained sensor nodes; wireless sensor networks; Authentication; Communities; Computer crime; Peer-to-peer computing; Watermarking; Wireless sensor networks; Id-based authentication scheme; Security; Wireless sensor network;
Conference_Titel :
Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-1855-6
DOI :
10.1109/CCIS.2012.6664540