Implementation and performance analysis of identity-based authentication in wireless sensor networks
The use of Wireless Sensor Networks (WSNs) in different fields of our life has increased for several recent years. It would be used in applications such as military, human-centric, environmental monitoring, and robotics for remote data collection. Compared to traditional networks, WSNs present more...
Saved in:
主要作者: | |
---|---|
格式: | Thesis |
语言: | English |
出版: |
2014
|
主题: | |
在线阅读: | http://eprints.utm.my/id/eprint/41650/1/MirAliRezazadehBaeeMFSKSM2014.pdf |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
id |
my-utm-ep.41650 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.416502017-09-11T05:56:05Z Implementation and performance analysis of identity-based authentication in wireless sensor networks 2014-01 Rezazadeh Baee, Mir Ali TK Electrical engineering. Electronics Nuclear engineering The use of Wireless Sensor Networks (WSNs) in different fields of our life has increased for several recent years. It would be used in applications such as military, human-centric, environmental monitoring, and robotics for remote data collection. Compared to traditional networks, WSNs present more challenges and issues due to their limited energy and bandwidth. This major restriction causes WSNs to be vulnerable under serious security threats, such as Denial of Service (DOS), Jamming, and Man-In-The-Middle (MITM). Until last few years, security solutions for WSNs were concentrated based on symmetric encryption algorithms to prepare authentication since, Public Key Infrastructure (PKI) has fallen from grace due to sensor nodes resource constraints. Despite more efficiency of symmetric cryptography than PKI in terms of energy, symmetric cryptosystems have some drawbacks such as key management. In addition, Public Key Cryptography (PKC) with resource hungry algorithm is not suitable for sensor node authentication. Recent researches on implementation of authentication mechanisms in WSNs show that, still sensor nodes suffer due to lack of a safe, fast, and lightweight authentication technique. This project focuses on secure sensor node authentication using Identity-Based Cryptography (IBC) in WSN. The proposed scheme uses Elliptic Curves Digital Signature Algorithm (ECDSA) with 224 bits key length to present a safe and lightweight authentication in compare to other pairing based algorithms. Additionally, the proposed scheme improves the security level of authentication between sensor nodes. Finally, this project implements and evaluates the proposed scheme using several parameters such as security, time, CPU, and memory requirements to measure the effectiveness of proposed scheme. 2014-01 Thesis http://eprints.utm.my/id/eprint/41650/ http://eprints.utm.my/id/eprint/41650/1/MirAliRezazadehBaeeMFSKSM2014.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
TK Electrical engineering Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering Electronics Nuclear engineering Rezazadeh Baee, Mir Ali Implementation and performance analysis of identity-based authentication in wireless sensor networks |
description |
The use of Wireless Sensor Networks (WSNs) in different fields of our life has increased for several recent years. It would be used in applications such as military, human-centric, environmental monitoring, and robotics for remote data collection. Compared to traditional networks, WSNs present more challenges and issues due to their limited energy and bandwidth. This major restriction causes WSNs to be vulnerable under serious security threats, such as Denial of Service (DOS), Jamming, and Man-In-The-Middle (MITM). Until last few years, security solutions for WSNs were concentrated based on symmetric encryption algorithms to prepare authentication since, Public Key Infrastructure (PKI) has fallen from grace due to sensor nodes resource constraints. Despite more efficiency of symmetric cryptography than PKI in terms of energy, symmetric cryptosystems have some drawbacks such as key management. In addition, Public Key Cryptography (PKC) with resource hungry algorithm is not suitable for sensor node authentication. Recent researches on implementation of authentication mechanisms in WSNs show that, still sensor nodes suffer due to lack of a safe, fast, and lightweight authentication technique. This project focuses on secure sensor node authentication using Identity-Based Cryptography (IBC) in WSN. The proposed scheme uses Elliptic Curves Digital Signature Algorithm (ECDSA) with 224 bits key length to present a safe and lightweight authentication in compare to other pairing based algorithms. Additionally, the proposed scheme improves the security level of authentication between sensor nodes. Finally, this project implements and evaluates the proposed scheme using several parameters such as security, time, CPU, and memory requirements to measure the effectiveness of proposed scheme. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Rezazadeh Baee, Mir Ali |
author_facet |
Rezazadeh Baee, Mir Ali |
author_sort |
Rezazadeh Baee, Mir Ali |
title |
Implementation and performance analysis of identity-based authentication in wireless sensor networks |
title_short |
Implementation and performance analysis of identity-based authentication in wireless sensor networks |
title_full |
Implementation and performance analysis of identity-based authentication in wireless sensor networks |
title_fullStr |
Implementation and performance analysis of identity-based authentication in wireless sensor networks |
title_full_unstemmed |
Implementation and performance analysis of identity-based authentication in wireless sensor networks |
title_sort |
implementation and performance analysis of identity-based authentication in wireless sensor networks |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Computing |
granting_department |
Faculty of Computing |
publishDate |
2014 |
url |
http://eprints.utm.my/id/eprint/41650/1/MirAliRezazadehBaeeMFSKSM2014.pdf |
_version_ |
1747816590038007808 |