You are not logged in.
Openly accessible

Lightweight authentication for recovery in wireless sensor networks

Li, Bai, Batten, Lynn and Doss, Robin 2009, Lightweight authentication for recovery in wireless sensor networks, in MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference, IEEE Computer Society, Piscataway, N. J., pp. 465-471.

Attached Files
Name Description MIMEType Size Downloads
batten-lightweightauthentication-2009.pdf Published version application/pdf 384.59KB 647

Title Lightweight authentication for recovery in wireless sensor networks
Author(s) Li, Bai
Batten, Lynn
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Conference name Mobile Ad-hoc and Sensor Networks. International Conference (5th : 2009 : Fujian Province, China)
Conference location Fujian Province, China
Conference dates 14-16 Dec. 2009
Title of proceedings MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference
Editor(s) [Unknown]
Publication date 2009
Conference series Mobile Ad-hoc and Sensor Networks International Conference
Start page 465
End page 471
Total pages 7
Publisher IEEE Computer Society
Place of publication Piscataway, N. J.
Keyword(s) wireless sensor network
hash function
authentication
Summary Wireless sensor networks (WSNs) suffer from a wide range of security attacks due to their limited processing and energy capabilities. Their use in numerous mission critical applications, however, requires that fast recovery from such attacks be achieved. Much research has been completed on detection of security attacks, while very little attention has been paid to recovery from an attack. In this paper, we propose a novel, lightweight authentication protocol that can secure network and node recovery operations such as re-clustering and reprogramming. Our protocol is based on hash functions and we compare the performance of two well-known lightweight hash functions, SHA-1 and Rabin. We demonstrate that our authentication protocol can be implemented efficiently on a sensor network test-bed with TelosB motes. Further, our experimental results show that our protocol is efficient both in terms of computational overhead and execution times which makes it suitable for low resourced sensor devices.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Language eng
Field of Research 100510 Wireless Communications
Socio Economic Objective 810106 Logistics
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2009, IEEE
Free to Read? Yes
Persistent URL http://hdl.handle.net/10536/DRO/DU:30028344

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 2 times in TR Web of Science
Scopus Citation Count Cited 10 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 549 Abstract Views, 650 File Downloads  -  Detailed Statistics
Created: Thu, 15 Apr 2010, 12:54:50 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.