Research Article
An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
@INPROCEEDINGS{10.1007/978-3-319-23829-6_9, author={Sarmadullah Khan and Rafiullah Khan and Inam Bari and Naveed Jan}, title={An Authentication and Key Management Scheme for Heterogeneous Sensor Networks}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I}, proceedings_a={SECURECOMM}, year={2015}, month={11}, keywords={Key management Authentication Sybil attacks}, doi={10.1007/978-3-319-23829-6_9} }
- Sarmadullah Khan
Rafiullah Khan
Inam Bari
Naveed Jan
Year: 2015
An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23829-6_9
Abstract
Recently, wireless sensor networks have attracted the attention of research comunity due to its numerous applications especially in mobility scenarios. However it also increases the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Hence a proper key management scheme needs to be proposed to secure both information and connectivity as well as provide better authentication in mobility enabled applications. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous sensor networks that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution agaist a well know attacks (sybil attacks) to show that it has good resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.