Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 7041381, 10 pages
https://doi.org/10.1155/2017/7041381
Research Article

BAS: The Biphase Authentication Scheme for Wireless Sensor Networks

1Department of CS & IT, University of Azad Jammu and Kashmir, Muzaffarabad 13100, Pakistan
2Department of Software, Ajou University, San 5, Woncheon-dong, Yeongtong-gu, Suwon 443-749, Republic of Korea
3Department of Computer Sciences, Preston University, 15 Shahrah-e-Faisal, Banglore Town, Karachi 75350, Pakistan

Correspondence should be addressed to Sanam Shahla Rizvi; moc.liamtoh@alhahs_manas

Received 2 August 2017; Accepted 10 October 2017; Published 6 November 2017

Academic Editor: Huaizhi Li

Copyright © 2017 Rabia Riaz et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.