JOURNAL ARTICLE

Secure Authentication Framework in Wireless Sensor Networks

Rumana AkhtarAbdullah Al-Mahmud

Year: 2012 Journal:   International Journal of Computer Applications Vol: 50 (15)Pages: 38-44

Abstract

The nodes in the wireless sensor networks collect data from their environment.Sometimes these data are valuable for the networks and also confidential.So it is important to prevent unauthorized access of those data.The preventive measure can be done through the authentication.In this paper, we propose an authentication framework that authenticates both the users of the network and sensor nodes based on the Identity-Based Signature (IBS) scheme.IBS uses the ECC (Elliptic Curve Cryptography) based digital signature algorithm (DSA) to sign a message and verify the signature on a message for a wireless sensor networks.This authentication framework register a new user and sensor node, authenticate a user and sensor node, and finally establishes a session key between sensor nodes and between sensor node and the user depends on the authenticating parties.Node and user revocation is handled in this authentication framework.Finally we made a comparison with other existing security solutions in wireless sensor networks and able to make a conclusion that the protocol provides confidentiality and integrity of the data; and also achieves better computational, communicational performance and energy efficiency due to the use of more efficient IBS algorithms based on ECC than those based on RSA.

Keywords:
Computer science Authentication (law) Wireless sensor network Computer network Computer security Wireless Telecommunications

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
16
Refs
0.20
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Security in Wireless Sensor Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.