Security and authentication scheme for hierarchical wireless sensor networks

Zhijiang Zhang*, Liehuang Zhu, Hong Tang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

To research the hierarchical wireless sensor network and its security, the security frame protocol SPINS is first analyzed and its deficiency is pointed out. In order to further enhance network security, the scheme proposed uses the thought of the network security technology (for example IPSec, SET and so on) to synthetically adopt the symmetrical and asymmetrical cryptology techniques for reference, and applies the certificate to the sensor networks. Because of the low-powered property, the certificate structure of the sensor nodes needs to be redesigned. By means of the redesigned certificate, the scheme can perform identity and data origin authentication. Finally, a security and performance analysis is provided based on the theory and simulation experiments. The conclusion shows that the scheme greatly promotes the security but decreases the network performance in comparison with SPINS. It can effectively solve the secure problems for the hierarchical wireless sensor network.

Original languageEnglish
Pages (from-to)243-248
Number of pages6
JournalDongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition)
Volume38
Issue numberSUPPL. 1
Publication statusPublished - Sept 2008

Keywords

  • Certificate rebuilding
  • SPINS protocol
  • Security scheme
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Security and authentication scheme for hierarchical wireless sensor networks'. Together they form a unique fingerprint.

Cite this