An Improved Asymmetric Key Based Security Architecture for WSN
Title | An Improved Asymmetric Key Based Security Architecture for WSN |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Quaum, M. A., Haider, S. Uddin, Haque, M. M. |
Conference Name | 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2) |
Keywords | AKA, asymmetric based scheme, Asymmetric Encryption, asymmetric key based security architecture, authentication, composability, compositionality, Computer architecture, cryptography, data transfers, Encryption, Human Behavior, Metrics, password, PEKS-PM, PKC, Pseudo inverse matrix., pubcrawl, public key cryptography, resilience, Resiliency, security of data, ubiquitous healthcare system, Wireless communication, wireless sensor networking, Wireless sensor networks, WSN |
Abstract | Ubiquitous Healthcare System (U-Healthcare) is a well-known application of wireless sensor networking (WSN). In this system, the sensors take less power for operating the function. As the data transfers between sensor and other stations is sensitive so there needs to provide a security scheme. Due to the low life of sensor nodes in Wireless Sensor Networks (WSN), asymmetric key based security (AKS) architecture is always considered as unsuitable for these types of networks. Several papers have been published in recent past years regarding how to incorporate AKS in WSN, Haque et al's Asymmetric key based Architecture (AKA) is one of them. But later it is found that this system has authentication problem and therefore prone to man-in-the-middle (MITM) attack, furthermore it is not a truly asymmetric based scheme. We address these issues in this paper and proposed a complete asymmetric approach using PEKS-PM (proposed by Pham in [8]) to remove impersonation attack. We also found some other vulnerabilities in the original AKA system and proposed solutions, therefore making it a better and enhanced asymmetric key based architecture. |
DOI | 10.1109/IC4ME2.2018.8465602 |
Citation Key | quaum_improved_2018 |
- Metrics
- WSN
- wireless sensor networks
- wireless sensor networking
- Wireless communication
- ubiquitous healthcare system
- security of data
- Resiliency
- resilience
- public key cryptography
- Pseudo inverse matrix.
- PKC
- PEKS-PM
- password
- pubcrawl
- Human behavior
- encryption
- data transfers
- Cryptography
- computer architecture
- Compositionality
- composability
- authentication
- asymmetric key based security architecture
- Asymmetric Encryption
- asymmetric based scheme
- AKA