Tango Binary Search Tree Based Asymmetric Cryptographic Sensor Node Authentication for Secured Communication in Wireless Sensor Networks

A. Cynthia, V. Saravanan
{"title":"Tango Binary Search Tree Based Asymmetric Cryptographic Sensor Node Authentication for Secured Communication in Wireless Sensor Networks","authors":"A. Cynthia, V. Saravanan","doi":"10.1166/sl.2020.4189","DOIUrl":null,"url":null,"abstract":"Wireless sensor network (WSN) comprises the group of sensor nodes distributed to sense and monitor the environments and collects the data. Due to the distributed nature of the sensor nodes, security is a major role to access the confidential data and protect the unauthorized access. In order to improve the secure communication, authentication is essential process in WSN. A Tango Binary Search Tree based Schmidt Cryptographic Sensor Node Authentication (TBST-SCSNA) technique is introduced for secured data communication in WSN with higher authentication accuracy. Initially, the trust values for each sensor nodes are calculated for increasing the security in data communication. The sensor nodes in WSN are arranged in tango binary search tree based on the trust value. The nodes in tree are inserted or removed based on their deployment. After that, the Schmidt-Samoa cryptographic technique is applied for node authentication and secure data communication. The cryptographic technique comprises three processes key generation, encryption and decryption. In key generation phase, the public key (i. e., node_ID) are generated and distributed for the sensor nodes and private key is kept secret using Schmidt-Samoa algorithm. The root node is embedded with a key during the deployment and it is controlled the entire the sensor nodes in the path. A Parent node generates the keys for child node based on the ID of parent node. After the key generation, the sender node encrypts the data packet and transmits to receiver node in the tree with the receiver node ID. After that, the receiver node enters their private key and verifies it with already stored key at the time of key generation. If both keys are same, then the node is said to be authentic node. Otherwise, the sensor node is said to be a malicious node. The authentic node only receives the original data packets. This process gets repeated till all the nodes in the path verify their identities and performs the secure communication. Simulation is carried out with different parameters such as authentication accuracy, authentication time and security level with respect to a number of sensor nodes and a number of data packets. The results observed that the TBST-SCSNA technique efficiently improves the node authentication accuracy, security level with minimum time than the state-of-the-art-methods.","PeriodicalId":21781,"journal":{"name":"Sensor Letters","volume":"61 1","pages":"55-63"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sensor Letters","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1166/sl.2020.4189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Wireless sensor network (WSN) comprises the group of sensor nodes distributed to sense and monitor the environments and collects the data. Due to the distributed nature of the sensor nodes, security is a major role to access the confidential data and protect the unauthorized access. In order to improve the secure communication, authentication is essential process in WSN. A Tango Binary Search Tree based Schmidt Cryptographic Sensor Node Authentication (TBST-SCSNA) technique is introduced for secured data communication in WSN with higher authentication accuracy. Initially, the trust values for each sensor nodes are calculated for increasing the security in data communication. The sensor nodes in WSN are arranged in tango binary search tree based on the trust value. The nodes in tree are inserted or removed based on their deployment. After that, the Schmidt-Samoa cryptographic technique is applied for node authentication and secure data communication. The cryptographic technique comprises three processes key generation, encryption and decryption. In key generation phase, the public key (i. e., node_ID) are generated and distributed for the sensor nodes and private key is kept secret using Schmidt-Samoa algorithm. The root node is embedded with a key during the deployment and it is controlled the entire the sensor nodes in the path. A Parent node generates the keys for child node based on the ID of parent node. After the key generation, the sender node encrypts the data packet and transmits to receiver node in the tree with the receiver node ID. After that, the receiver node enters their private key and verifies it with already stored key at the time of key generation. If both keys are same, then the node is said to be authentic node. Otherwise, the sensor node is said to be a malicious node. The authentic node only receives the original data packets. This process gets repeated till all the nodes in the path verify their identities and performs the secure communication. Simulation is carried out with different parameters such as authentication accuracy, authentication time and security level with respect to a number of sensor nodes and a number of data packets. The results observed that the TBST-SCSNA technique efficiently improves the node authentication accuracy, security level with minimum time than the state-of-the-art-methods.
基于Tango二叉搜索树的无线传感器网络安全通信非对称加密传感器节点认证
无线传感器网络(WSN)是由一组分布在网络中的传感器节点组成的网络,用于感知和监测环境并收集数据。由于传感器节点的分布式特性,安全是访问机密数据和保护未经授权访问的主要作用。为了提高通信的安全性,认证是无线传感器网络中必不可少的环节。提出了一种基于Tango二叉搜索树的施密特加密传感器节点认证技术(TBST-SCSNA),用于WSN中安全的数据通信,具有较高的认证精度。首先,计算每个传感器节点的信任值,以提高数据通信的安全性。基于信任值的探戈二叉搜索树将WSN中的传感器节点进行排列。根据部署情况插入或删除树中的节点。然后,采用Schmidt-Samoa加密技术进行节点认证和数据安全通信。加密技术包括密钥生成、加密和解密三个过程。在密钥生成阶段,为传感器节点生成并分发公钥(即node_ID),并使用Schmidt-Samoa算法对私钥进行保密。根节点在部署过程中嵌入一个密钥,并由路径中的整个传感器节点控制。父节点根据父节点的ID为子节点生成键。密钥生成后,发送节点对数据包进行加密,发送给接收节点ID所在树中的接收节点。之后,接收方节点输入其私钥,并在生成密钥时使用已存储的密钥进行验证。如果两个密钥相同,则称该节点为可信节点。否则,该传感器节点被认为是恶意节点。被认证节点只接收原始数据包。此过程将重复进行,直到路径中的所有节点验证其身份并执行安全通信。针对多个传感器节点和多个数据包,采用不同的认证精度、认证时间和安全级别等参数进行仿真。结果表明,TBST-SCSNA技术在最短的时间内提高了节点认证的准确性和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Sensor Letters
Sensor Letters 工程技术-电化学
自引率
0.00%
发文量
0
审稿时长
6 months
期刊介绍: The growing interest and activity in the field of sensor technologies requires a forum for rapid dissemination of important results: Sensor Letters is that forum. Sensor Letters offers scientists, engineers and medical experts timely, peer-reviewed research on sensor science and technology of the highest quality. Sensor Letters publish original rapid communications, full papers and timely state-of-the-art reviews encompassing the fundamental and applied research on sensor science and technology in all fields of science, engineering, and medicine. Highest priority will be given to short communications reporting important new scientific and technological findings.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信