Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm
by Vandana Mohindru; Yashwant Singh; Ravindara Bhatt
International Journal of Information and Computer Security (IJICS), Vol. 12, No. 2/3, 2020

Abstract: Message communication in WSNs is not secure because energy-starving networks are vulnerable to numerous security attacks mainly due to their nature of distribution and unprotected communication. Securing communication in these networks not only needs to provide the elementary security but also needs resistance against countless attacks. Message authentication and integrity is a serious concern for sensor networks security, therefore, sensor network must assure the distribution of authentic message without any amendment or alteration. To solve these problems, a lightweight message authentication algorithm is proposed for securing message communication in WSNs. The algorithm uses Mod and XOR operations to compute fixed size hash value or message digest. The scheme is robust as a slight change in the message will affect the hash value extensively. The comparative analysis of the proposed algorithm is done with authentication algorithms available in the literature with the help of various metrics. Results show that the proposed message authentication algorithm is energy efficient and secure against node replication attacks. Also, proposed algorithm have 48.75 µJ communications overhead, 4.416 µJ of computational overhead and 3 bytes of storage overheads that is very less as compared to other algorithms present in the literature.

Online publication date: Fri, 14-Feb-2020

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com