International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

An Authentication and Key Management Scheme for Heterogeneous Sensor Networks

Download
235 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_9,
        author={Sarmadullah Khan and Rafiullah Khan and Inam Bari and Naveed Jan},
        title={An Authentication and Key Management Scheme for Heterogeneous Sensor Networks},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Key management Authentication Sybil attacks},
        doi={10.1007/978-3-319-23829-6_9}
    }
    
  • Sarmadullah Khan
    Rafiullah Khan
    Inam Bari
    Naveed Jan
    Year: 2015
    An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_9
Sarmadullah Khan1,*, Rafiullah Khan2,*, Inam Bari3,*, Naveed Jan1,*
  • 1: CECOS University
  • 2: University of Genova
  • 3: FAST NUCES Peshawar
*Contact email: sarmad@cecos.edu.pk, Rafiuk7@gmail.com, inam.bari@nu.edu.pk, naveed@cecos.edu.pk

Abstract

Recently, wireless sensor networks have attracted the attention of research comunity due to its numerous applications especially in mobility scenarios. However it also increases the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Hence a proper key management scheme needs to be proposed to secure both information and connectivity as well as provide better authentication in mobility enabled applications. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous sensor networks that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution agaist a well know attacks (sybil attacks) to show that it has good resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.