An Authentication and Key Management Scheme for Heterogeneous Sensor Networks

Sarmadullah Khan, Rafiullah Khan, Inam Bari, Naveed Jan

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

76 Downloads (Pure)

Abstract

Recently, wireless sensor networks have attracted the attention of research comunity due to its numerous applications especially in mobility scenarios. However it also increases the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Hence a proper key management scheme needs to be proposed to secure both information and connectivity as well as provide better authentication in mobility enabled applications. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous sensor networks that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution agaist a well know attacks (sybil attacks) to show that it has good resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.
Original languageEnglish
Title of host publicationInternational Conference on Security and Privacy in Communication Networks
PublisherSpringer
Pages123-131
Number of pages9
ISBN (Electronic)978-3-319-23829-6
ISBN (Print)978-3-319-23828-9
DOIs
Publication statusPublished - 08 Nov 2015
Externally publishedYes
Event10th International Conference on Security and Privacy in Communication Networks - Beijing, China
Duration: 24 Sep 201426 Sep 2014
http://securecomm.org/2014/show/home (Link to conference details online)

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
PublisherSpringer
Volume152
ISSN (Print)1867-8211

Conference

Conference10th International Conference on Security and Privacy in Communication Networks
Abbreviated titleSecurecomm2014
CountryChina
CityBeijing
Period24/09/201426/09/2014
Internet address

Fingerprint Dive into the research topics of 'An Authentication and Key Management Scheme for Heterogeneous Sensor Networks'. Together they form a unique fingerprint.

  • Cite this

    Khan, S., Khan, R., Bari, I., & Jan, N. (2015). An Authentication and Key Management Scheme for Heterogeneous Sensor Networks. In International Conference on Security and Privacy in Communication Networks (pp. 123-131). (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Vol. 152). Springer. https://doi.org/10.1007/978-3-319-23829-6_9