Node Behavior and Identity-Based Trusted Authentication in Wireless Sensor Networks
LIU Tao,XIONG Yan,HUANG Wenchao,LU Qiwei,GONG Xudong
DOI: https://doi.org/10.3724/sp.j.1087.2013.01842
2013-01-01
Journal of Computer Applications
Abstract:Concerning the vulnerability to attack from external and internal nodes and node failure due to openness and limited resources in Wireless Sensor Network(WSN),an efficient,secure trusted authentication scheme was proposed.The theory of identity-based and bilinear pairings was adopted in the authentication key agreement and update.The node trust value was computed by node behavior reputation management based on Beta distribution.The symmetric cryptosystem combined with message authentication code was used in certification process between trusted nodes which were identified by the trust value.The scheme not only can prevent eavesdropping,injection,replay,denial of service and other external attacks,but also is able to withstand internal threats such as the selective forwarding,Wormhole attack,Sinkhole attack and Sybil attack.The analysis and comparison with SPINS scheme show that the scheme can achieve longer network lifetime,smaller certification delay,greater security and scalability in the same network environment.The scheme has good application value in unattended WSN with high safety requirements.