Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016 (2016), Article ID 1547963, 9 pages
http://dx.doi.org/10.1155/2016/1547963
Research Article

A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

Key Lab of Electronic and Communication Engineering, Heilongjiang University, Harbin, China

Received 3 June 2016; Revised 6 September 2016; Accepted 21 September 2016

Academic Editor: Jose Maria de Fuentes

Copyright © 2016 Danyang Qin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002. View at Publisher · View at Google Scholar · View at Scopus
  2. Z. Chen, M. He, W. Liang, and K. Chen, “Trust-aware and low energy consumption security topology protocol of wireless sensor network,” Journal of Sensors, vol. 2015, Article ID 716468, 10 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Verma and Prachi, “Key pre-distribution scheme for WSNs,” Ad-Hoc and Sensor Wireless Networks, vol. 23, no. 1-2, pp. 47–67, 2014. View at Google Scholar · View at Scopus
  4. S. Bag, “A new key predistribution scheme for grid-group deployment of wireless sensor networks,” Ad Hoc and Sensor Wireless Networks, vol. 27, no. 3-4, pp. 313–329, 2015. View at Google Scholar
  5. M. Eltoweissy, M. Moharrum, and R. Mukkamala, “Dynamic key management in sensor networks,” IEEE Communications Magazine, vol. 44, no. 4, pp. 122–130, 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “Spins: security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521–534, 2002. View at Publisher · View at Google Scholar · View at Scopus
  7. B. C. Lai, D. D. Hwang, S. P. Kim, and I. Verbauwhede, “Reducing radio energy consumption of key management protocols for wireless sensor networks,” in Proceedings of the ACM International Symposium on Low Power Electronics and Design (ISLPED '04), pp. 351–356, Newport Beach, Calif, USA, 2004.
  8. O. D. Mohatar, A. F. Sabater, and J. M. Sierra, “A light-weight authentication scheme for wireless sensor networks,” Ad Hoc Networks, vol. 9, no. 5, pp. 727–735, 2011. View at Google Scholar
  9. F. Ishmanov, A. S. Malik, S. W. Kim, and B. Begalov, “Trust management system in wireless sensor networks: design considerations and research challenges,” Transactions on Emerging Telecommunications Technologies, vol. 26, no. 2, pp. 107–130, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Yener and S. Ulukus, “Wireless physical-layer security: lessons learned from information theory,” Proceedings of the IEEE, vol. 103, no. 10, pp. 1814–1825, 2015. View at Publisher · View at Google Scholar
  11. J. Rabaey and J. Ammer, “Distributed framework for correlated data gathering in sensor networks,” IEEE Transactions on Mobile Computing, vol. 57, no. 1, pp. 578–593, 2010. View at Google Scholar
  12. K. C. Egemen, B. Dan, and D. Amit, “Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach,” Telecommunication Systems, vol. 2, no. 6, pp. 751–768, 2013. View at Google Scholar
  13. L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770–772, 1981. View at Publisher · View at Google Scholar · View at Scopus
  14. O. Bazan and M. Jaseemuddin, “A survey on MAC protocols for wireless adhoc networks with beamforming antennas,” IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 216–239, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Wang, J. Lai, M. Hu, and Y. Liang, “Research on key technologies for implementing network security situation awareness,” Geomatics and Information Science of Wuhan University, vol. 33, no. 10, pp. 995–998, 2008. View at Google Scholar · View at Scopus
  16. P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, “On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1728–1740, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. D. Lucas and J. Joel, “A survey on cross-layer solutions for wireless sensor networks,” IEICE Transaction on Journal of Network and Computer Applications, vol. 5, no. 34, pp. 523–534, 2011. View at Google Scholar
  18. C. Wang, X.-Y. Shi, and Z.-H. Niu, “The research of the promotion for ECDSA algorithm based on Montgomery-form ECC,” Journal on Communications, vol. 31, no. 1, pp. 9–13, 2010. View at Google Scholar · View at Scopus
  19. K. Okeya and K. Sakurai, “A scalar multiplication algorithm with recovery of the y-coordinate on the montgomery form and analysis of efficiency for elliptic curve cryptosystems,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 85, no. 1, pp. 84–93, 2002. View at Google Scholar · View at Scopus
  20. G. Anastasi and M. Conti, “Data collection in sensor networks with data mules: an intergrade simulation analysis,” IEEE Symposium on Computers and Communications, vol. 3, no. 7, pp. 1096–1102, 2012. View at Google Scholar