A trust enhancement scheme for cluster-based wireless sensor networks

作者: Tianshu Wang , Kongfa Hu , Xichen Yang , Gongxuan Zhang , Yongli Wang

DOI: 10.1007/S11227-018-2693-Y

关键词: Node (networking)Hash functionComputer networkComputer scienceAuthentication protocolEfficient energy useEnergy consumptionCryptographic protocolWireless sensor networkAuthenticationOverhead (computing)Data integrity

摘要: Security is crucial in wireless sensor networks (WSNs) since a growing variety of applications require strict security. Cluster-based architecture has an enhancement the system performance WSNs. This article presents trust scheme for cluster-based WSNs, where network time divided into multiple rounds. Each round contains setup phase and steady-state phase. In phase, clusters are formed mutual trusted relationships between cluster nodes established through two proposed authentication protocols called SET-μTESLA (Setup μTESLA) SET-SCHNORR SCHNORR). uses authenticated broadcast μTESLA reduces iterations hash function to improve energy efficiency, while applies lightweight signature SCHNORR scheme. collected environmental or physical data transmitted STEADY-μTESLA protocol (Steady-state μTESLA), which guarantees credibility. The analysis demonstrates that security does well resisting such attacks as confidentiality attacks, integrity compromise node attacks. addition, results calculations simulations show performs better than existing terms communication overhead consumption.

参考文章(39)
Ryan Catherman, David Challener, David Safford, Leendert Van Doorn, Kent Yoder, A Practical Guide to Trusted Computing ,(2007)
Wen Hu, Peter Corke, Wen Chan Shih, Leslie Overs, secFleck: A Public Key Technology Platform for Wireless Sensor Networks international conference on embedded wireless systems and networks. pp. 296- 311 ,(2009) , 10.1007/978-3-642-00224-3_19
Steffen Wagner, Christoph Krauß, Claudia Eckert, T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 511- 521 ,(2012) , 10.1007/978-3-642-31909-9_32
Georgios Smaragdakis, Azer Bestavros, Ibrahim Matta, SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks Boston University Computer Science Department. ,(2004)
Christoph Krauß, Frederic Stumpf, Claudia Eckert, Detecting node compromise in hybrid wireless sensor networks using attestation techniques security of ad hoc and sensor networks. pp. 203- 217 ,(2007) , 10.1007/978-3-540-73275-4_15
P. Jones, rd D. Eastlake, US Secure Hash Algorithm 1 (SHA1) RFC. ,vol. 3174, pp. 1- 22 ,(2001)
Janusz Furtak, Jan Chudzikiewicz, Securing transmissions between nodes of WSN using TPM federated conference on computer science and information systems. ,vol. 5, pp. 1059- 1068 ,(2015) , 10.15439/2015F144
Md. Azharuddin, Prasanta K. Jana, A distributed algorithm for energy efficient and fault tolerant routing in wireless sensor networks Wireless Networks. ,vol. 21, pp. 251- 267 ,(2015) , 10.1007/S11276-014-0782-2
Yongwei Wu, Chen Gang, Jia Liu, Rui Fang, Xiaomeng Huang, Guangwen Yang, Weimin Zheng, Automatically constructing trusted cluster computing environment The Journal of Supercomputing. ,vol. 55, pp. 51- 68 ,(2011) , 10.1007/S11227-009-0315-4
Yongsheng Liu, Jie Li, M. Guizani, PKC Based Broadcast Authentication using Signature Amortization for WSNs IEEE Transactions on Wireless Communications. ,vol. 11, pp. 2106- 2115 ,(2012) , 10.1109/TWC.2012.032812.110433