A Lightweight energy efficient and QoS centric protocol with multifactor authentication in integrating wireless sensor networks with IoT
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Verification of the identity of a person, organization or a system as a whole is defined
newlineas Authentication. The verification mechanism generally involves many factors and
newlinethe level of security is proportional to the number and types of factors involved.
newlineMutual authentication is a type of authentication that allows the entities involved to
newlinesimultaneously authenticate each other by establishing a communication channel that
newlineis secure between them. In Wireless Sensor Network(WSN), authentication plays a
newlinecritical role as only registered should gain access to the SNs for data. In this scenario,
newlineany new user is authenticated first by sensor node and then the gateway node in the
newlineWSN. However, on account of the resource constraint nature and vulnerability of
newlineSensor Nodes(SNs), there is always challenges lurking around in terms of physical
newlinecapture by any intruders and compromise. Therefore, over the years designing WSN
newlinethat is both secure with multi-factor user-authentication techniques has been a
newlinechallenging proposition for researchers.
newlineThe thesis broadly studies the importance of two key parameters - Security
newline(confidentiality and authentication) and Quality-of-Service (QoS) while integrating
newlineIoT in a multi-gateway based WSN. The first study deals with simple power analysis
newlineattacks. Elliptic Curve Cryptography (ECC) is based on one fundamental operation
newlinecalled scalar multiplication which in turn is based on two operations called point
newlineaddition and point doubling. It is known that both the operation consumes different
newlineamount of power. In WSNs where ECC is implemented, each node requires to perform
newlinethese two operations. In general, addition is represented as 1 and doubling as 0. And
newlinethe same binary notations are used for recording the keys too which are normally
newlineprivate. An attacker can utilize this knowledge to try any side channel attacks. These
newlinekind of attacks help the attacker to determine the key easily just by analyzing the
newlinepower consumption during the encryption and decryption process in the network and
newlinetime taken to