دورية أكاديمية

MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks

التفاصيل البيبلوغرافية
العنوان: MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks
المؤلفون: Muhammad Adil, Rahim Khan, Mohammed Amin Almaiah, Mohammed Al-Zahrani, Muhammad Zakarya, Muhammad Saeed Amjad, Rehan Ahmed
المصدر: IEEE Access, Vol 8, Pp 44459-44469 (2020)
بيانات النشر: IEEE, 2020.
سنة النشر: 2020
المجموعة: LCC:Electrical engineering. Electronics. Nuclear engineering
مصطلحات موضوعية: WSNs, AODV protocol, black hole attacks, MAC-Based AODV, authentication, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
الوصف: Wireless sensor networks (WSNs) is an infrastructure free organization of various operational devices. Due to their overwhelming characteristics, these networks are used in different applications. For WSNs, it is necessary to collect real time and precise data as critical decisions are based on these readings in different application scenarios. In WSNs, authentication of the operational devices is one the challenge issue to the research community as these networks are dynamic and self-organizing in nature. Moreover, due to the constraint oriented nature of these devices a generalized light-weight authentication scheme is needed to be developed. In this paper, a light-weight anonymous authentication techniques is presented to resolve the black-hole attack issue associated with WSNs. In this scheme, Medium Access Control (Mac) address is used to register every node in WSNs with its nearest cluster head (CH) or base station module(s). The registration process is performed in an off-line phase to ensure authenticity of both legitimate nodes and base stations in an operational network. The proposed technique resolves the black-hole attack issue as an intruder node needs to be registered with both gateway and neighbouring nodes which is not possible. Moreover, a hybrid data encryption scheme, elliptic curve integrated encryption standard (ECIES) and elliptic curve deffi-hellman problem (ECDDHP), is used to improve authenticity, confidentiality and integrity of the collected data. Simulation results show the exceptional performance of the proposed scheme against field proven techniques in terms of minimum possible end-to-end delay & communication cost, maximum average packet delivery ratio and throughput in presence of malicious node(s).
نوع الوثيقة: article
وصف الملف: electronic resource
اللغة: English
تدمد: 2169-3536
Relation: https://ieeexplore.ieee.org/document/9024027/; https://doaj.org/toc/2169-3536
DOI: 10.1109/ACCESS.2020.2978303
URL الوصول: https://doaj.org/article/878e608972404552973f586b98176fd4
رقم الأكسشن: edsdoj.878e608972404552973f586b98176fd4
قاعدة البيانات: Directory of Open Access Journals
الوصف
تدمد:21693536
DOI:10.1109/ACCESS.2020.2978303