Identity-based secure protocol scheme for wireless sensor network

  • Authors:
  • Sang-Ho Na;Kyu-Jin Kim;Mohammad Mehedi Hassan;Eui-Nam Huh

  • Affiliations:
  • KyungHee University, South Korea;KyungHee University, South Korea;KyungHee University, South Korea;KyungHee University, South Korea

  • Venue:
  • Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

One of the major challenges for wireless sensor networks is to find out a suitable authentication scheme due to the constraints of computational capacity, power and storage size. Many researchers have focused on public or symmetric key cryptography and proposed the identity-based encryption techniques. In our previous work, we proposed also an identity-based authentication framework that guarantees the safe defense against different kinds of attacks like hello flood, wormhole, sinkhole, location deployment attack, and man in the middle attack. But, the previous identity-based authentication scheme was much vulnerable to malicious attacker masquerading as a neighbor node. So in this paper, we have improved our previous identity-based authentication scheme and proposed a robust secure protocol that can audit forged attacker nodes for wireless sensor networks.