Cluster forming based on spatial information using HMAC in WSN

Main Article Content

Aso Ahmed Majeed

Abstract

The wireless sensor can be considered as one of the most major technologies through using it in different application such as environmental applications, military applications, commercial applications, health applications and agriculture applications. Due to the sensor networks may be deployed in open area (uncontrolled area), especially in military applica­tions. In such situ­ations, the nodes are vulnerable to be captured. Moreover, data/control packets may be inter­cepted and/or modified due to the transmission nature.


Consequently, security services such as authentication and encryption done by key manage­ment which is not trivial task. The key management is important to maintain the network op­erations. The proposed scheme the nodes based on spatial information with data sequence then sends encryption message to each other in secure way by HMAC for providing safe links between the nodes in the network and forming the clusters. Consequently, the proposed scheme covers the security goals and au­thentication of each node.

Article Details

How to Cite
Aso Ahmed Majeed. (2023). Cluster forming based on spatial information using HMAC in WSN. Tikrit Journal of Pure Science, 22(6), 131–139. https://doi.org/10.25130/tjps.v22i6.801
Section
Articles

References

[1] K. Rasul, N. Nuerie, and A. S. K. Pathan, 2010,"An Enhanced Tree-Based Key anagement Scheme for Secure Communication in Wireless Sensor Network," in High Performance Compu-ting and Communications (HPCC), 12th IEEE In-ternational Conference , pp. 671-676.

[2] Y. Zhang and J. Pengfei, 2014, "An efficient and hybrid key management for heterogeneous wireless sensor networks," in The 26th Chinese Control and Decision Conference (CCDC), pp. 1881-1885.

[3] A. Tajeddine, A. Kayssi, A. Chehab, and I. Elhajj, 2014, "Authentication schemes for wire-less sensor networks," in MELECON 17th IEEE Mediterranean Electrotechnical Conference, pp. 367-372.

[4] F. Legendre, G. Dequen, and M. Krajecki, 2012, "Encoding Hash Functions as a SAT Prob-lem," in IEEE 24th International Conference on Tools with Artificial Intelligence, pp. 916-921.

[5] A. A. Alkandari, I. F. T. Alshaikhli, and M. A. Alahmad, 2013, "Cryptographic hash function: A high level view,",IEEE International Conference on Informatics and Creative Multimedia, PP. 128-134.

[6] M. I. Salam, P. Kumar, and L. HoonJae, 2010, "An efficient key pre-distribution scheme for wireless sensor network using public key cryptography," in Networked Computing and A-dvanced Information Management (NCM), Sixth International Conference on, pp. 402-407.

[7] R. K. Kodali, 2014, "Key management tech-nique for WSNs," in Region 10 Symposium, IEEE, pp. 540-545.

[8] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, 2000, "Energy-efficient commu-nication protocol for wireless microsensor net-works," in System Sciences, Proceedings of the 33rd Annual Hawaii International Conference on, p. 10 pp. vol.2.

[9] A. C. Shakir, J. Min, and G. Xuemai, 2012, "Elliptic Curve Cryptography Based Scheme for Key Predistribution in the Heterogeneous Wirel-ess Sensor Network," wulfenia, vol. 19, pp. 131-142.

[10] E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, 2006, "Recommendation for key man-agement-part 1: General (revised," in NIST sp-ecial publication.

[11] R. Yasmin, 2012, "An efficient authenticat-ion framework for wireless sensor networks," Ph.D, thesis, University of Birmingham.

[12] T. Lalitha and A. J. Devi, 2014, "Security in Wireless Sensor Networks: Key Management Module in EECBKM," in Computing and Commu-nication Technologies (WCCCT), World Congress on, pp. 306-308.

[13] G. Gulhane and N. V. Mahajan, 2014, "Sec-uring Multipath Routing Protocol Using Authen-tication Approach for Wireless Sensor Networ-k," in Communication Systems and Network Tec-hnologies (CSNT), Fourth International Confere-nce on, pp. 729-733.

[14] P. R. Vamsi and K. Kant, 2014, "A light-weight Sybil attack detection framework for Wi-reless Sensor Networks," in Contemporary Com-puting (IC3), Seventh International Conference on, pp. 387-393.

[15] Q. Yang, Q. Li, and S. Li, 2008, "An Efficient Key Management Scheme for Heterogeneous Sensor Networks," in 4th International Confere-nce on Wireless Communications, Networking and Mobile Computing, pp. 1-4.

[16] L. M. C. Arboleda and N. Nasser, 2006, "Co-mparison of Clustering Algorithms and Protoco-ls for Wireless Sensor Networks," in Canadian Conference on Electrical and Computer Enginee-ring, pp. 1787-1792.

[17] N. Bulusu, J. Heidemann, D. Estrin, and T. Tran, 2004,"Self-configuring localization system-s: Design and experimental evaluation," ACM Transactions on Embedded Computing Systems (TECS), vol. 3, pp. 24-60.

[18] K. Rajendiran, R. Sankararajan, and R. Pala-niappan, 2011, "A secure key predistribution sc-heme for WSN using elliptic curve cryptogr-aphy," ETRI Journal, vol. 33, pp. 791-801.

[19] R. Blom, 1984, "An optimal class of symm-etric key generation systems," in Workshop on the Theory and Application of of Cryptographic Techniques, pp. 335-338.

[20] Z. Benenson, F. C. Gärtner, and D. Kesdog-an, 2004, "User Authentication in Sensor Netw-orks," in GI Jahrestagung (2), pp. 385-389.

[21] C. Jiang, B. Li, and H. Xu, 2007, "An efficie-nt scheme for user authentication in wireless sensor networks," in Advanced Information Net-working and Applications Workshops, AINAW-'07. 21st International Conference on, pp. 438-442.

[22] H.-R. Tseng, R.-H. Jan, and W. Yang, 2007, "An improved dynamic user authentication sch-eme for wireless sensor networks," in Global Telecommunications Conference, 2007. GLOBE-COM'07. IEEE, pp. 986-990.

[23] Y. Zhang, X. Li, J. Liu, J. Yang, and B. Cui, 2012, "A secure hierarchical key management scheme in wireless sensor network," Internat-ional Journal of Distributed Sensor Networks,PP. 1-8.

[24] S. Hussain, F. Kausar, and A. Masood, 2007, "An efficient key distribution scheme for heterogeneous sensor networks," in Proceed-ings of the international conference on Wireless communications and mobile computing, pp. 388-392.

[25] B. Maala, H. Bettahar, and A. Bouabdallah, 2008, "TLA: A Tow Level Architecture for Key Management in Wireless Sensor Networks," in Sensor Technologies and Applications, 2008. SENSORCOMM'08. Second International Confer-ence on, pp. 639-644.