Date of Publication :7th June 2016
Abstract: In wireless sensor network (WSN) various types of sensors are used and deployed in the network to collect useful physical parameters and some highly sensitive information is then been transmitted between the nodes and to the base station, without any human intervention. Hence, message authenticity and security are major requirements in WSN. Since the cryptographic schemes used for wired networks tend to exhaust wireless sensor network resources, they cannot be directly used in sensor networks. Here the Zero Knowledge Protocol (ZKP) is implemented in the network for the authentication and verification of sender sensor nodes before transmitting any sensitive information. In proposed scheme an optimal number of challenge questions are also used to maintain a balance between the added security and the increase in cost. Increase in the number of challenge question makes up to the reduced key size thus providing an improved security. The proposed scheme was assessed based on the MATLAB simulation and an analysis was performed.
Reference :
-
[1] K.R. Venugopal and L.M. Patnaik, “Authentication in WirelessSensor Networks Using Zero Knowledge Protocol”, ICIP 2011,CCIS 157, pp. 416¸S421, 2011.Springer-Verlag Berlin Heidelberg 2011.
[2] Siba K. Udgata, AlefiahMubeen, Samrat L. Sabat, “WirelessSensor Network Security model using Zero Knowledge Protocol” Proceedings of ICC, IEEE International Conference, 2011,pages 1-5.
[3] Limin Ma, Yu Ge, Yuesheng Zhu, “TinyZKP: A Lightweight Authentication Scheme Based on ZeroKnowledge Proof for Wireless Body Area”, Wireless PersCommun DOI 10.1007/s11277-013-1555-4, Springer Science+Business Media New York 2013.
[4] Joseph Binder, Hans Peter Bischof, “Zero Knowledge Proofs ofIdentity for Ad Hoc Wireless Networks An InDepth Study”,Technical Report, 2003. http://www.cs.rit.edu/sb7384/zkpsurvey.pdf
[5] Goldwasser, S., Micali, S., Rackoff, “The Knowledge Complexity of Interactive Proof Systems”. SIAM J. Computing 18,186â A¸S208 (1989).
[6] Feige, U., Fiat, A., Shamir, “A.: Zero Knowledge Proofs ofIdentity”. J. Cryptology 1, 77âS94 (1988).
[7] Goldreich, O., Micali, S., and Wigderson, “Proofs That YieldNothing But Their Validity Or All Languages in NP HaveZeroknowledge Proof Systems”, Journal of the ACM, Vol. 38,No. 1, pp.691-729, 1991
[8] Tuyls, Pim T. (Mol, BE), Murray, Bruce (Eastleigh, GB), ”Efficient Implementation of Zero Knowledge Protocols” ,UnitedStates NXP B.V. (Eindhoven, NL) 7555646 ,June 2009,http://www.freepatentsonline.com/7555646.html.
[9] MuneeraHashim, Santhosh Kumar G., and Sreekumar A, “Authentication in Wireless Sensor Networks Using Zero Knowledge Protocol” ICIP 2011, CCIS 157, pp. 416- ¸S421, 011. C Springer-Verlag Berlin Heidelberg 2011.
[10] Anshul, D., Roy, S.S.: “A ZKP-based Identification for BaseNodes in Wireless Sensor Networks”. In: 2005 ACM Symposium on Applied Computing, pp. 319-¸S323. ACM Press, NewYork (2005).
[11] A. Perrig, R.Szewczyk, V.Wen, D.Culler, and J.Tygar.â˘AIJSpins: Security protocol for sensor networks,I In proceedings of Seventh Annual International Conference on MobileComputing and Networks, July 2001
[12] C. Karlof, N. Sastry, and D. Wagner, Tinysec: a link layersecurity architecture for wireless sensor networks, in SenSys,2004, pp. 162-175.
[13] S. Zhu, S. Setia, and S. Jajodia, Leap+: Efcient security mechanisms for large-scale distributed sensor networks, TOSN, vol.2, 2006.