Secure Key Management and Mutual Authentication Protocol for Wireless Sensor Network by Linking Edge Devices using Hybrid Approach

Sharmila, Pramod Kumar, Shashi Bhushan, Manoj Kumar, Mamoun Alazab

Research output: Contribution to journalArticlepeer-review

19 Downloads (Pure)

Abstract

Wireless Sensor Networks (WSNs) play a crucial role in developing the Internet of Things (IoT) by collecting data from hostile environments like military and civil domains with limited resources. IoT devices need edge devices to perform real-time processing without compromising the security with the help of key management and authentication schemes. The above applications are prone to eavesdropper due to cryptographic algorithms' weaknesses for providing security in WSNs. The security protocols for WSNs are different from the traditional networks because of the limited resource of sensor nodes. Existing key management schemes require large key sizes to provide high-security levels, increasing the computational and communication cost for key establishment. This paper proposes a Hybrid Key Management Scheme for WSNs linking edge devices which use Elliptic Curve Cryptography (ECC) and a hash function to generate key pre-distribution keys. The Key establishment is carried out by merely broadcasting the node identity. The main reason for incorporating a hybrid approach in the key pre-distribution method is to achieve mutual authentication between the sensor nodes during the establishment phase. The proposed method reduces computational complexity with greater security and the proposed scheme can be competently applied into resource constraint sensor nodes.

Original languageEnglish
Pages (from-to)2935-2957
Number of pages23
JournalWireless Personal Communications
Volume130
Issue number4
Early online date10 Apr 2023
DOIs
Publication statusPublished - Jun 2023

Fingerprint

Dive into the research topics of 'Secure Key Management and Mutual Authentication Protocol for Wireless Sensor Network by Linking Edge Devices using Hybrid Approach'. Together they form a unique fingerprint.

Cite this