inis 18: e1

Research Article

A Secure Authentication Scheme based on Brownian Motion in hierarchy Wireless Sensor Networks

Download25 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.160389,
        author={Minh  Hoang  Trong and Ngoc  Le  Van and Nguyen  Lang  Tuan and Hai  Hoang  Dang},
        title={A Secure Authentication Scheme based on Brownian Motion in hierarchy Wireless Sensor Networks},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems: Online First},
        volume={},
        number={},
        publisher={EAI},
        journal_a={INIS},
        year={2019},
        month={9},
        keywords={wireless sensor networks, authentication, Brownian motion, watermark technique},
        doi={10.4108/eai.13-7-2018.160389}
    }
    
  • Minh Hoang Trong
    Ngoc Le Van
    Nguyen Lang Tuan
    Hai Hoang Dang
    Year: 2019
    A Secure Authentication Scheme based on Brownian Motion in hierarchy Wireless Sensor Networks
    INIS
    EAI
    DOI: 10.4108/eai.13-7-2018.160389
Minh Hoang Trong1,*, Ngoc Le Van1, Nguyen Lang Tuan1, Hai Hoang Dang1
  • 1: Posts and Telecommunication Institute of Technology, Hanoi, Vietnam
*Contact email: hoangtrongminh@ptit.edu.vn

Abstract

In the last few years, the Internet of Things (IoT) has experienced exponential advancements. In IoT infrastructures, Wireless Sensor Network (WSN) has been considered as one of the crucial technologies to support a lot of amazing services. To fulfill new requirements of deployed network environments, the security issue in wireless sensor networks has to be met new challenges such as secured and lightweight requirements simultaneously. Hence, in this paper, an authentication scheme based on the watermarking technique is proposed to secure the sensory data in hierarchy wireless sensor networks. Especially, natural movement characteristics of a sensor node are exploited to provide a conveniently watermarked data, that can be used to validate and detect data integrity attacks in familiar methods. The proposed authentication scheme is evaluated by numerical results and theoretically analyzed to prove a proposal efficiency.