Browse > Article
http://dx.doi.org/10.7471/ikeee.2017.21.4.348

A Study on Authentication of Wireless Sensor Networks based on Hash Function  

Bae, Sung-Hyun (Dept. of Aviations Information & Communication KyungWoon University)
Moon, Young-Joon (Dept. of Electronics Engineering, Kyungpook National University)
Kim, Hae-Mun (Dept. of Materials & Energy Engineering, KyungWoon University)
Publication Information
Journal of IKEEE / v.21, no.4, 2017 , pp. 348-352 More about this Journal
Abstract
A lot of researches have done for WSN(Wireless Sensor Networks) authentication. Those are divided by whether using certificates or not for the authentication. In this paper, we proposed certificateless protocol. As simplifying the process of authentication, overall the process become faster and the load of the sensor node is decreased. Using the method we proposed, the energy consumption is decreased. That is because instead using keyed hash authentication code(HMAC) simple one way hash function was used. The study confirmed that it could operate on sensor nodes with extremely limited resources and low processing power.
Keywords
WSN(Wireless Sensor Networks); Authentication; Hash Function; Identity; Session Key;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Yick, B. Mukherjee and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol.52, pp. 2292-2330, 2008. DOI:10.1016/j.comnet.2008.04.002   DOI
2 S. Agemura, K. Katayama and H. Ohsaki, "On the effect of Wireless Communication Range Heterogeneity on WSN Performance," International Conference on Information Networking (ICOIN), pp. 35-40, 2017. DOI: 10.1109/ICOIN.2017.7899449
3 B. Schneier, Applied crypography, John Wiley & Sons Inc., New York edition, 1996.
4 P. Porambage, C. Schmitt, P. Kumar, A. Gurtov and M. Ylianttila, "Two - phase authentication protocol for wireless sensor networks in distributed IoT applications," in Wireless Communications and Networking Conference (WCNC), pp. 2728-2733, Apr. 2014. DOI: 10.1109/WCNC.2014.6952860
5 H. Khemissa and D. Tandjaoui, "A Novel Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things," 2016 Wireless Telecommunications Symposium (WTS), London, pp. 1-6, 2016.
6 A. D. Wood and J. Stankovic "Denial of service in sensor networks," Computer, vol.35, no.10, pp. 54-62, 2002. DOI: 10.1109/MC.2002.1039518   DOI
7 K. Xue, C. Ma, P. Hong and R. Ding "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks," Journal of Network and Computer Applications, vol.36, pp. 316-323, 2012. DOI:10.1016/j.jnca.2012.05.010