Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2016, Article ID 6854303, 16 pages
http://dx.doi.org/10.1155/2016/6854303
Review Article

Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

1Department of Computer Science and Engineering, Regional Centre of Anna University, Tirunelveli, Tamil Nadu 627 007, India
2Department of Computer Science and Engineering, National Engineering College, Kovilpatti, Tamil Nadu 628 503, India

Received 8 October 2015; Revised 19 December 2015; Accepted 20 December 2015

Academic Editor: Junghyun Nam

Copyright © 2016 S. Raja Rajeswari and V. Seenivasagam. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, “An effective key management scheme for heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24–34, 2007. View at Publisher · View at Google Scholar · View at Scopus
  2. D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41–77, 2005. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Eltoweissy, M. Moharrum, and R. Mukkamala, “Dynamic key management in sensor networks,” IEEE Communications Magazine, vol. 44, no. 4, pp. 122–130, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Sen, “A survey on wireless sensor network security,” International Journal of Communication Networks and Information Security, vol. 1, pp. 55–78, 2009. View at Google Scholar
  5. K. H. Wong, Y. Zheng, J. Cao, and S. Wang, “A dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, p. 8, IEEE, Taichung, Taiwan, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. T.-H. Lee, “Simple dynamic user authentication protocols for wireless sensor networks,” in 2008 Second International Conference on Sensor Technologies and Applications (SENSORCOMM '08), pp. 657–660, Cap Esterel, France, August 2008. View at Publisher · View at Google Scholar
  7. B. Vaidya, J. Sá Silva, and J. J. P. C. Rodrigues, “Robust dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet '09), pp. 88–91, ACM, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. O. Cheikhrouhou, A. Koubâa, M. Boujelben, and M. Abid, “A lightweight user authentication scheme for wireless sensor networks,” in Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA '10), pp. 1–7, Hammamet, Tunisia, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. H.-R. Tseng, R.-H. Jan, and W. Yang, “An improved dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07), pp. 986–990, Washington, DC, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. A. K. Das, P. Sharma, S. Chatterjee, and J. K. Sing, “A dynamic password-based user authentication scheme for hierarchical wireless sensor networks,” Journal of Network and Computer Applications, vol. 35, no. 5, pp. 1646–1656, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. X. Anita, M. A. Bhagyaveni, and J. M. L. Manickam, “Collaborative lightweight trust management scheme for wireless sensor networks,” Wireless Personal Communications, vol. 80, no. 1, pp. 117–140, 2015. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Fan and G. Gong, “Lpkm: a lightweight polynomial-based key management protocol for distributed wireless sensor networks,” in Ad Hoc Networks, vol. 111 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 180–195, Springer, Berlin, Germany, 2013. View at Google Scholar
  13. M. Singh, A. R. Sardar, R. R. Sahoo, K. Majumder, S. Ray, and S. K. Sarkar, “Lightweight trust model for clustered WSN,” in Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, pp. 765–773, Springer, 2015. View at Google Scholar
  14. O. Delgado-Mohatar, A. Fúster-Sabater, and J. M. Sierra, “A light-weight authentication scheme for wireless sensor networks,” Ad Hoc Networks, vol. 9, no. 5, pp. 727–735, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Raja Rajeswari and V. Seenivasagam, “Secured energy conserving slot-based topology maintenance protocol for wireless sensor networks,” Wireless Personal Communications, pp. 1–24, 2015. View at Publisher · View at Google Scholar
  16. T. Zhang and H. Qu, “A lightweight key management scheme for wireless sensor networks,” in Proceedings of the 2nd International Workshop on Education Technology and Computer Science (ETCS '10), pp. 272–275, Wuhan, China, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. F. Ullah, T. Mehmood, M. Habib, and M. Ibrahim, “SPINS: security protocols for sensor networks,” in Proceedings of International Conference on Machine Learning and Computing (ICMLC '09), vol. 3, 2009.
  18. A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks,” Communications of the ACM, vol. 47, no. 6, pp. 53–57, 2004. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521–534, 2002. View at Publisher · View at Google Scholar
  20. S. Zhu, S. Setia, and S. Jajodia, “LEAP+: efficient security mechanisms for large-scale distributed sensor networks,” ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500–528, 2006. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management schemes in wireless sensor networks,” Computer Communications, vol. 30, no. 11-12, pp. 2314–2341, 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, “Fast authenticated key establishment protocols for self-organizing sensor networks,” in Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA '03), pp. 141–150, San Diego, Calif, USA, September 2003. View at Publisher · View at Google Scholar · View at Scopus
  23. P. Vijayakumar and V. Vijayalakshmi, “Effective key establishment and authentication protocol for wireless sensor networks using elliptic curve cryptography,” in Proceedings of the Conference on Mobile and Pervasive Computing (CoMPC '08), August 2008.
  24. D. J. Malan, M. Welsh, and M. D. Smith, “A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography,” in Proceedings of the 1st Annual IEEE Conference on Communications Society Sensor and Ad Hoc Communications and Networks (SECON '04), Santa Clara, Calif, USA, 2004.
  25. Y. Qiu, J. Zhou, J. Baek, and J. Lopez, “Authentication and key establishment in dynamic wireless sensor networks,” Sensors, vol. 10, no. 4, pp. 3718–3731, 2010. View at Publisher · View at Google Scholar · View at Scopus
  26. R. Wang, W. Du, and P. Ning, “Containing denial-of-service attacks in broadcast authentication in sensor networks,” in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 71–79, ACM, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. P. Ning, A. Liu, and W. Du, “Mitigating DoS attacks against broadcast authentication in wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 4, article 1, 2008. View at Publisher · View at Google Scholar · View at Scopus
  28. Q. Dong, D. Liu, and P. Ning, “Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks,” in Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08), pp. 2–12, ACM, Alexandria, Va, USA, March-April 2008. View at Publisher · View at Google Scholar
  29. X. Sun, X. Wu, C. Huang, Z. Xu, and J. Zhong, “Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks,” Ad Hoc Networks, vol. 37, pp. 324–336, 2016. View at Publisher · View at Google Scholar
  30. R. Wang, W. Du, X. Liu, and P. Ning, “ShortPK: a short-term public key scheme for broadcast authentication in sensor networks,” ACM Transactions on Sensor Networks, vol. 6, no. 1, article 9, 2009. View at Publisher · View at Google Scholar · View at Scopus
  31. K. Ren, S. Yu, W. Lou, and Y. Zhang, “Multi-user broadcast authentication in wireless sensor networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4554–4564, 2009. View at Publisher · View at Google Scholar · View at Scopus
  32. S.-M. Chang, S. Shieh, W. W. Lin, and C.-M. Hsieh, “An efficient broadcast authentication scheme in wireless sensor networks,” in Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS '06), pp. 311–320, Taipei, Taiwan, March 2006. View at Publisher · View at Google Scholar · View at Scopus
  33. S. U. Khan, C. Pastrone, L. Lavagno, and M. A. Spirito, “An authentication and key establishment scheme for the IP-based wireless sensor networks,” Procedia Computer Science, vol. 10, pp. 1039–1045, 2012. View at Publisher · View at Google Scholar
  34. K.-A. Shim, Y.-R. Lee, and C.-M. Park, “EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks,” Ad Hoc Networks, vol. 11, no. 1, pp. 182–189, 2013. View at Publisher · View at Google Scholar · View at Scopus
  35. R. Rathore and M. Hussain, “Simple, secure, efficient, lightweight and token based protocol for mutual authentication in wireless sensor networks,” in Emerging Research in Computing, Information, Communication and Applications, 462, p. 451, Springer, New Delhi, India, 2015. View at Publisher · View at Google Scholar
  36. L. Ma, Y. Ge, and Y. Zhu, “TinyZKP: a lightweight authentication scheme based on zero-knowledge proof for wireless body area networks,” Wireless Personal Communications, vol. 77, no. 2, pp. 1077–1090, 2014. View at Publisher · View at Google Scholar · View at Scopus
  37. A. R. Chowdhury, T. Chatterjee, and S. DasBit, “LOCHA: a light-weight one-way cryptographic hash algorithm for wireless sensor network,” Procedia Computer Science, vol. 32, pp. 497–504, 2014. View at Google Scholar
  38. C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo, “Constrained function-based message authentication for sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 407–425, 2011. View at Publisher · View at Google Scholar · View at Scopus
  39. W. R. Claycomb and D. Shin, “A novel node level security policy framework for wireless sensor networks,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 418–428, 2011. View at Publisher · View at Google Scholar · View at Scopus
  40. Y. Liu, J. Li, and M. Guizani, “PKC based broadcast authentication using signature amortization for WSNs,” IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2106–2115, 2012. View at Publisher · View at Google Scholar · View at Scopus
  41. E. Ayday and F. Fekri, “A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks,” Ad Hoc Networks, vol. 10, no. 7, pp. 1278–1290, 2012. View at Publisher · View at Google Scholar · View at Scopus
  42. X. Shi and D. Xiao, “A reversible watermarking authentication scheme for wireless sensor networks,” Information Sciences, vol. 240, pp. 173–183, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  43. H. Hayouni and M. Hamdi, “Energy efficient key menagement scheme for clustered hierarchical wireless sensor networks,” in Proceedings of the IEEE 12th International Conference on Networking, Sensing and Control (ICNSC '15), pp. 105–109, Taipei, Taiwan, April 2015. View at Publisher · View at Google Scholar
  44. E. A. M. Anita, R. Geetha, and E. Kannan, “A novel hybrid key management scheme for establishing secure communication in wireless sensor networks,” Wireless Personal Communications, vol. 82, pp. 1419–1433, 2015. View at Publisher · View at Google Scholar · View at Scopus
  45. W. Yao, S. Han, and X. Li, “LKH++ based group key management scheme for wireless sensor network,” Wireless Personal Communications, vol. 83, no. 4, pp. 3057–3073, 2015. View at Publisher · View at Google Scholar
  46. M. Sharifi, S. S. Kashi, and S. P. Ardakani, “LAP: a lightweight authentication protocol for smart dust wireless sensor networks,” in Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS '09), pp. 258–265, IEEE, Baltimore, Md, USA, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  47. B. Li, L. M. Batten, and R. Doss, “Lightweight authentication for recovery in wireless sensor networks,” in Proceedings of the 5th International Conference on Mobile Ad-hoc and Sensor Networks (MSN '09), pp. 465–471, Fujian, China, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  48. M. D. Shah, S. N. Gala, and N. M. Shekokar, “Lightweight authentication protocol used in wireless sensor network,” in Proceedings of the International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA '14), pp. 138–143, IEEE, Mumbai, India, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  49. R. A. Shaikh, S. Lee, M. A. U. Khan, and Y. J. Song, “LSec: lightweight security protocol for distributed wireless sensor network,” in Personal Wireless Communications, vol. 4217 of Lecture Notes in Computer Science, pp. 367–377, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  50. T. A. Zia and A. Y. Zomaya, “A lightweight security framework for wireless sensor networks,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, pp. 53–73, 2011. View at Google Scholar · View at Scopus
  51. M. Sharifi, S. P. Ardakani, and S. S. Kashi, “SKEW: an efficient self key establishment protocol for wireless sensor networks,” in Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS '09), pp. 250–257, Baltimore, Md, USA, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  52. S. A. Camtepe and B. Yener, “Key distribution mechanisms for wireless sensor networks: a survey,” Tech. Rep., Rensselaer Polytechnic Institute, Troy, New York, NY, USA, 2005. View at Google Scholar
  53. R. D. Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. Havinga, “LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks,” in Proceedings of the International Conference on Parallel Processing Workshops, pp. 397–406, Kaohsiung, Taiwan, October 2003. View at Publisher · View at Google Scholar
  54. W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), vol. 1, IEEE, Hong Kong, March 2004. View at Publisher · View at Google Scholar
  55. A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast authentication protocol,” RSA CryptoBytes, vol. 5, 2005. View at Google Scholar
  56. F. Ullah, T. Mehmood, M. Habib, M. Ibrahim, and S. Zulfikar, “SPINS: security protocols for sensor networks,” in Proceedings of the International Conference on Communication Engineering and Networks (IPCSIT '11), Singapore, 2011.
  57. D. Liu and P. Ning, “Multilevel μTESLA: broadcast authentication for distributed sensor networks,” ACM Transactions on Embedded Computing Systems, vol. 3, no. 4, pp. 800–836, 2004. View at Publisher · View at Google Scholar
  58. D. Liu, P. Ning, S. Zhu, and S. Jajodia, “Practical broadcast authentication in sensor networks,” in Proceedings of the Mobile and Ubiquitous Systems: Networking and Services Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '05), pp. 118–129, San Diego, Calif, USA, July 2005. View at Publisher · View at Google Scholar
  59. M. Luk, A. Perrig, and B. Whillock, “Seven cardinal properties of sensor network broadcast authentication,” in Proceedings of the 4th ACM Workshop on Security of ad Hoc and Sensor Networks (SASN '06), pp. 147–156, Alexandria, VA, USA, 2006. View at Publisher · View at Google Scholar
  60. Y. Zhou and Y. Fang, “WSN09-1: BABRA: batch-based broadcast authentication in wireless sensor networks,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '06), pp. 1–5, San Francisco, Calif, USA, December 2006. View at Publisher · View at Google Scholar · View at Scopus
  61. B. Groza, “Broadcast authentication with practically unbounded one-way chains,” Journal of Software, vol. 3, no. 3, pp. 11–20, 2008. View at Google Scholar · View at Scopus
  62. Y. Liu, J. Li, and M. Guo, “Long duration broadcast authentication for wireless sensor networks,” in Proceedings of the IEEE 75th Vehicular Technology Conference (VTC Spring '12), pp. 1–5, IEEE, Yokohama, Japan, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  63. A. Studer, F. Bai, B. Bellur, and A. Perrig, “Flexible, extensible, and efficient VANET authentication,” Journal of Communications and Networks, vol. 11, no. 6, pp. 574–588, 2009. View at Publisher · View at Google Scholar · View at Scopus
  64. J. Drissi and Q. Gu, “Localized broadcast authentication in large sensor networks,” in Proceedings of the International conference on Networking and Services (ICNS '06), p. 25, IEEE, Silicon Valley, Calif, USA, July 2006. View at Publisher · View at Google Scholar
  65. T. Kwon and J. Hong, “Secure and efficient broadcast authentication in wireless sensor networks,” IEEE Transactions on Computers, vol. 59, no. 8, pp. 1120–1133, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  66. R. Amin and G. Biswas, “A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks,” Ad Hoc Networks, vol. 36, part 1, pp. 58–80, 2016. View at Publisher · View at Google Scholar
  67. K. Grover and A. Lim, “A survey of broadcast authentication schemes for wireless networks,” Ad Hoc Networks, vol. 24, pp. 288–316, 2015. View at Publisher · View at Google Scholar · View at Scopus