Back to Search Start Over

An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs

Authors :
Jie Wu
Weiping Wang
Yun Cheng
Jianxin Wang
Boqing Zhou
Sujun Li
Source :
IEEE Internet of Things Journal. 6:9738-9747
Publication Year :
2019
Publisher :
Institute of Electrical and Electronics Engineers (IEEE), 2019.

Abstract

Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS) replication attack. In this attack, using the compromised key information, an attacker can collect data from networks by impersonating sinks. To resist such an attack, some schemes have been proposed. To improve the resilience of MS replication attack of these schemes, we can integrate them with schemes based on deployment knowledge. However, there are the following defects: 1) the probability of mutual authentication between a MS and a sensor node is less than 1 and 2) during the authentication phase, the energy consumption of sensor nodes increases significantly as the deployment area expands. In this paper, we construct 3-D backward key chains based on deployment knowledge and propose a new authentication scheme based on these. As compared with these existing related schemes, the detailed theory analysis and simulation results indicate that the scheme can ensure that a MS can be authenticated by sensor nodes, and can improve the resilience of networks’ MS replication attack with low energy consumption.

Details

ISSN :
23722541
Volume :
6
Database :
OpenAIRE
Journal :
IEEE Internet of Things Journal
Accession number :
edsair.doi...........8909336a77f9cbfd5dfcb563e51e1a04
Full Text :
https://doi.org/10.1109/jiot.2019.2930823