Friday 19th of April 2024
 

Identity-based Trusted Authentication in Wireless Sensor Networks


Yusnani Mohd Yussoff, Habibah Hashim and Mohd Dani Baba

Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely deployed to ensure confidentiality, authenticity and integrity of the nodes and data. Recently many WSNs applications rely on trusted communication to ensure large user acceptance. Indeed, the trusted relationship thus far can only be achieved through Trust Management System (TMS) or by adding external security chip on the WSN platform. In this study an alternative mechanism is proposed to accomplish trusted communication between sensors based on the principles defined by Trusted Computing Group (TCG). The results of other related study have also been analyzed to validate and support our findings. Finally the proposed trusted mechanism is evaluated for the potential application on resource constraint devices by quantifying their power consumption on selected major processes. The result proved the proposed scheme can establish trust in WSN with less computation and communication and most importantly eliminating the need for neighboring evaluation for TMS or relying on external security chip.

Keywords: Trusted, Security, Authentication, Wireless Sensor Network, Identity-based cryptography

Download Full-Text


ABOUT THE AUTHORS

Yusnani Mohd Yussoff
Universiti Teknologi MARA

Habibah Hashim
Universiti Teknologi MARA

Mohd Dani Baba
Universiti Teknologi MARA


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »