Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 7041381, 10 pages
https://doi.org/10.1155/2017/7041381
Research Article

BAS: The Biphase Authentication Scheme for Wireless Sensor Networks

1Department of CS & IT, University of Azad Jammu and Kashmir, Muzaffarabad 13100, Pakistan
2Department of Software, Ajou University, San 5, Woncheon-dong, Yeongtong-gu, Suwon 443-749, Republic of Korea
3Department of Computer Sciences, Preston University, 15 Shahrah-e-Faisal, Banglore Town, Karachi 75350, Pakistan

Correspondence should be addressed to Sanam Shahla Rizvi; moc.liamtoh@alhahs_manas

Received 2 August 2017; Accepted 10 October 2017; Published 6 November 2017

Academic Editor: Huaizhi Li

Copyright © 2017 Rabia Riaz et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. S. Rizvi and T.-S. Chung, “PIYAS-Proceeding to intelligent service oriented memory allocation for flash based data centric sensor devices in wireless sensor networks,” Sensors, vol. 10, no. 1, pp. 292–312, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002. View at Publisher · View at Google Scholar · View at Scopus
  3. S. S. Rizvi and T. S. Chung, “Performance evaluation of indices-based query optimization from flash-based data centric sensor devices in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 258080, 10 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Riaz, S. S. Rizvi, E. Mushtaq et al., “OSAP: online smartphone’s user authentication protocol,” International Journal of Computer Science and Network Security, vol. 17, no. 3, pp. 7–12, 2017. View at Google Scholar
  5. J. Zheng and M. J. Lee, “Will IEEE 802.15.4 make ubiquitous networking a reality?: a discussion on a potential low power, low bit rate standard,” IEEE Communications Magazine, vol. 42, no. 6, pp. 140–146, 2004. View at Publisher · View at Google Scholar
  6. A. Koubaa, M. Alves, and E. Tovar, “IEEE 802.15.4 for wireless sensor networks: a technical overview,” in Proceedings of the 11th IEEE International Conference, pp. 400–406, 2005.
  7. M. Hoberl, I. Haider, and B. Rinner, “Towards a Secure Key Generation and Storage Framework on Resource-Constrained Sensor Nodes,” in Proceedings of the International Conference on Embedded Wireless Systems and Networks, pp. 313–318, 2016.
  8. S. Prasad, S. Jaiswal, N. S. V. Shet, and P. Sarwesh, “Energy aware routing protocol for resource constrained wireless sensor networks,” in Proceedings of the 1st International Conference on Informatics and Analytics, ICIA 2016, August 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Granlund, P. Holmlund, and C. Åhlund, “Opportunistic mobility support for resource constrained sensor devices in smart cities,” Sensors, vol. 15, no. 3, pp. 5112–5135, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127, May 2003. View at Publisher · View at Google Scholar
  11. B. Lai, S. Kim, and I. Verbauwhede, “Scalable session key construction protocol for wireless sensor network,” in Proceedings of IEEE Workshop on Large Scale Real Time and Embedded Systems (LARTES), pp. 1–6, 2006.
  12. S. S. Rizvi and T.-S. Chung, “Investigation of in-network data mining approach for energy efficient data centric wireless sensor networks,” International Review on Computers and Software, vol. 8, no. 2, pp. 443–447, 2013. View at Google Scholar · View at Scopus
  13. J. Gul, S. Mushtaq, and R. Riaz, “Optimal guard node placement using SGLD and energy factor,” Journal of Computing, vol. 4, no. 6, pp. 87–92, 2012. View at Google Scholar
  14. B.-C. C. Lai, S. P. Kim, I. Verbauwhede, and D. D. Hwang, “Reducing Radio Energy Consumption of Key Management Protocols for Wireless Sensor Networks,” in Proceedings of the 2004 International Symposium on Low Power Electronics and Design, ISLPED 2004, pp. 351–356, August 2004. View at Publisher · View at Google Scholar · View at Scopus
  15. K. Kifayat, M. Merabti, Q. Shi, and L. J. David, “Security in wireless sensor networks,” in Handbook of Information and Communication Security, 2010, Part E, pp. 513–552, 2010. View at Publisher · View at Google Scholar
  16. K. H. M. Wong, Y. Zheng, J. Cao, and Wang, “A dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 318–327, 2006.
  17. H. R. Tseng, R. H. Jan, and W. Yang, “An improved dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07), pp. 986–990, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. R. Riaz, A Unified Security Framework for IP Based Wireless Sensor Networks [Ph.D. thesis], 2008.
  19. R. Riaz, A. Naureen, A. Akram, A. H. Akbar, K. H. Kim, and H. Farooq Ahmed, “A unified security framework with three key management schemes for wireless sensor networks,” Computer Communications, vol. 31, no. 18, pp. 4269–4280, 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. Q. Mamun, “A qualitative comparison of different logical topologies for wireless sensor networks,” Sensors, vol. 12, no. 11, pp. 14887–14913, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, “System architecture directions for networked sensors,” in In Proceedings of the ACM ASPLOS IX, pp. 93–104, 2000.
  22. Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2–22, 2006. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: technical challenges, recent advances, and future trends,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1727–1765, 2016. View at Publisher · View at Google Scholar · View at Scopus