Implementation of Node Authentication for WSN Using Hash Chains

This paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains...

Full description

Saved in:
Bibliographic Details
Published inProcedia computer science Vol. 89; pp. 90 - 98
Main Authors Moon, Ayaz Hassan, Iqbal, Ummer, Bhat, G. Mohiuddin
Format Journal Article
LanguageEnglish
Published Elsevier B.V 2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains and Elliptical Curve Crytography (ECC) without using any digital signature algorithm or any public key cryptography. The usage of hidden generator point derived from hash-chains provides defense against a man-in-the-middle attack which is prominent in ECDH (Elliptical Curve Diffie-Hellman) due to lack of entity authentication. The authentication protocol has been simulated on Tossim and its performance bench marking has also been carried out.
ISSN:1877-0509
1877-0509
DOI:10.1016/j.procs.2016.06.013