Username   Password       Forgot your password?  Forgot your username? 


Random Unite Authentication for Multiple Nodes in  Wireless Sensor Networks

Volume 15, Number 3, March 2019, pp. 949-958
DOI: 10.23940/ijpe.19.03.p24.949958

Fan Zhang

Zhengzhou Institute of Technology, Zhengzhou, 450000, China

(Submitted on November 5, 2018; Revised on December 3, 2018; Accepted on January 2, 2019)


In a wireless sensor network, authentication of multiple nodes can effectively reduce the overhead of node communication and improve the security of wireless sensor network operation. However, when the node was authenticated by existing methods, the positional information of the node was easily exposed, resulting in a high calculation repetition rate and increased consumption of node communication. A random unite authentication method based on RSA and trusted nodes was proposed. The multi-node authentication model of the RSA method was used to effectively authenticate other nodes in the wireless sensor network. The node trust degree was introduced, and the node authentication key was updated by the identity-based and bilinear theory. After the trust reputation management based on the Beta distribution node was used to calculate the trust degree of the node, it was verified whether the trust degree of the communication node was trustworthy to the node; the verification result was identified. Finally, the method of combining symmetric cryptography with node information authentication code was used to implement trusted node authentication in wireless sensor networks. Experiments showed that the authentication node results of this mechanism were stable, which overcame the shortcomings of low stability of multi-node authentication results in the current method.


References: 15

        1. T. Shang, G. Du, and J. -W. Liu, “Opportunistic Quantum Network Coding based on Quantum Teleportation,” Quantum Information Processing, Vol. 15, pp. 1743-1763, 2016
        2. D. He, S. Zeadally, B. Xu, and X. Huang, “An Efficient Identity-based Conditional Privacy-Preserving Authentication Scheme for Vehicular ad hoc Networks,” IEEE Transactions on Information Forensics and Security, Vol. 10, pp. 2681-2691, 2015
        3. S. Liu, W. Fu, W. Zhao, J. Zhou, and Q. Li, “A Novel Fusion Method by Static and Moving Facial Capture,” Mathematical Problems in Engineering, Vol. 2013, pp. 503924, 2013
        4. G. Yang and S. Liu, “Distributed Cooperative Algorithm for k-M Set with Negative Integer k by Fractal Symmetrical Property,” International Journal of Distributed Sensor Networks, Vol. 10, pp. 398583, 2014
        5. G. Huang, T. Liu, and Y. Guan, “Secure Authentication Scheme of WSN based on Tri-element Node Evaluation,” Computer Engineering, Vol. 41, pp. 115-119, 2015
        6. M. Liu, S. Liu, W. Fu, and J. Zhou, “Distributional Escape Time Algorithm based on Generalized Fractal Sets in Cloud Environment,” Chinese Journal of Electronics, Vol. 24, pp. 124-127, 2015
        7. H. Liu, R. Yin, B. Liu, and Y. Li, “A Scale-Free Topology Model with Fault-Tolerance and Intrusion-Tolerance in Wireless Sensor Networks,” Computers & Electrical Engineering, Vol. 56, pp. 533-543, 2016
        8. K. -A. Shim, “BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks,” IEEE Transactions on Information Forensics and Security, Vol. 12, pp. 1545-1554, 2017
        9. S. Amri, F. Khelifi, A. Bradai, A. Rachedi, M. L. Kaddachi, and M. Atri, “A New Fuzzy Logic based Node Localization Mechanism for Wireless Sensor Networks,” Future Generation Computer Systems, 2017
        10. I. Strumberger, M. Beko, M. Tuba, M. Minovic, and N. Bacanin, “Elephant Herding Optimization Algorithm for Wireless Sensor Network Localization Problem,” in Proceedings of the 9th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, pp. 175-184, Costa de Caparica, Portugal, May 2-4, 2018
        11. J. -B. Li and B. -C. Mu, “Moving Node Localization Algorithm based on Cooperated Prediction for Wireless Sensor Networks,” Computer Application Research, Vol. 34, pp. 186-187, 2017
        12. S. Guo, J. Li, and S. Gao, “Design and Realization of Multi-Node Software Trigger Bootloader,” Modern Electronics Technique, Vol. 18, pp. 011, 2017
        13. Z. Wan, N. Xiong, and L. T. Yang, “Cross-Layer Video Transmission over IEEE 802.11 E Multihop Networks,” Multimedia Tools and Applications, Vol. 74, pp. 5-23, 2015
        14. Y. Bai, X. Shao, W. Yang, W. Wang, P. Feng, S. Liu, et al., “Nodes Contact Probability Estimation Approach based on Bayesian Network for DTN,” in Proceedings of NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1-4, 2018
        15. C. -C. Chang and H. -D. Le, “A Provably Secure, Efficient, and Flexible Authentication Scheme for ad hoc Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 15, pp. 357-366, 2016


        Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

        This site uses encryption for transmitting your passwords.