BAS: The Biphase Authentication Scheme for Wireless Sensor Networks

The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcas...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2017-01, Vol.2017 (2017), p.1-10
Hauptverfasser: Yaqub, Nazish, Rizvi, Sanam Shahla, Chung, Tae Sun, Riaz, Rabia
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10
container_issue 2017
container_start_page 1
container_title Security and communication networks
container_volume 2017
creator Yaqub, Nazish
Rizvi, Sanam Shahla
Chung, Tae Sun
Riaz, Rabia
description The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.
doi_str_mv 10.1155/2017/7041381
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455785454</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455785454</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-523294d03bb56fc587d090457840029a9b574e75fb6ebcbde9345b56e69959213</originalsourceid><addsrcrecordid>eNqF0MtLw0AQBvBFFKzVm2dZ8Kixs69s1ltbfEHRQyselzwmJLVN6m5K8b93S4oePc0M_PgGPkIuGdwxptSIA9MjDZKJhB2RATPCRMA4P_7dmTwlZ94vAWImtRyQ6WQ8v6eLCumk3lSpRzredhU2XZ2nXd02dJ5XuEZato5-1A5X6D2dY-PD_YrdrnWf_pyclOnK48VhDsn748Ni-hzN3p5epuNZlIsYukhxwY0sQGSZistcJboAA1LpRAJwk5pMaYlalVmMWZ4VaIRUgWJsjDKciSG57nM3rv3aou_sst26Jry0XKqQo6SSQd32Knet9w5Lu3H1OnXfloHd12T3NdlDTYHf9LyqmyLd1f_pq15jMFimf5qDgESKH3u4bms</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455785454</pqid></control><display><type>article</type><title>BAS: The Biphase Authentication Scheme for Wireless Sensor Networks</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Yaqub, Nazish ; Rizvi, Sanam Shahla ; Chung, Tae Sun ; Riaz, Rabia</creator><contributor>Li, Huaizhi</contributor><creatorcontrib>Yaqub, Nazish ; Rizvi, Sanam Shahla ; Chung, Tae Sun ; Riaz, Rabia ; Li, Huaizhi</creatorcontrib><description>The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2017/7041381</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Communication ; Denial of service attacks ; Energy ; Messages ; Nodes ; Security management ; Sensors ; Wireless networks ; Wireless sensor networks</subject><ispartof>Security and communication networks, 2017-01, Vol.2017 (2017), p.1-10</ispartof><rights>Copyright © 2017 Rabia Riaz et al.</rights><rights>Copyright © 2017 Rabia Riaz et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-523294d03bb56fc587d090457840029a9b574e75fb6ebcbde9345b56e69959213</citedby><cites>FETCH-LOGICAL-c360t-523294d03bb56fc587d090457840029a9b574e75fb6ebcbde9345b56e69959213</cites><orcidid>0000-0001-5992-1136 ; 0000-0003-4694-3250</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Li, Huaizhi</contributor><creatorcontrib>Yaqub, Nazish</creatorcontrib><creatorcontrib>Rizvi, Sanam Shahla</creatorcontrib><creatorcontrib>Chung, Tae Sun</creatorcontrib><creatorcontrib>Riaz, Rabia</creatorcontrib><title>BAS: The Biphase Authentication Scheme for Wireless Sensor Networks</title><title>Security and communication networks</title><description>The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.</description><subject>Communication</subject><subject>Denial of service attacks</subject><subject>Energy</subject><subject>Messages</subject><subject>Nodes</subject><subject>Security management</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNqF0MtLw0AQBvBFFKzVm2dZ8Kixs69s1ltbfEHRQyselzwmJLVN6m5K8b93S4oePc0M_PgGPkIuGdwxptSIA9MjDZKJhB2RATPCRMA4P_7dmTwlZ94vAWImtRyQ6WQ8v6eLCumk3lSpRzredhU2XZ2nXd02dJ5XuEZato5-1A5X6D2dY-PD_YrdrnWf_pyclOnK48VhDsn748Ni-hzN3p5epuNZlIsYukhxwY0sQGSZistcJboAA1LpRAJwk5pMaYlalVmMWZ4VaIRUgWJsjDKciSG57nM3rv3aou_sst26Jry0XKqQo6SSQd32Knet9w5Lu3H1OnXfloHd12T3NdlDTYHf9LyqmyLd1f_pq15jMFimf5qDgESKH3u4bms</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Yaqub, Nazish</creator><creator>Rizvi, Sanam Shahla</creator><creator>Chung, Tae Sun</creator><creator>Riaz, Rabia</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-5992-1136</orcidid><orcidid>https://orcid.org/0000-0003-4694-3250</orcidid></search><sort><creationdate>20170101</creationdate><title>BAS: The Biphase Authentication Scheme for Wireless Sensor Networks</title><author>Yaqub, Nazish ; Rizvi, Sanam Shahla ; Chung, Tae Sun ; Riaz, Rabia</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-523294d03bb56fc587d090457840029a9b574e75fb6ebcbde9345b56e69959213</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Communication</topic><topic>Denial of service attacks</topic><topic>Energy</topic><topic>Messages</topic><topic>Nodes</topic><topic>Security management</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yaqub, Nazish</creatorcontrib><creatorcontrib>Rizvi, Sanam Shahla</creatorcontrib><creatorcontrib>Chung, Tae Sun</creatorcontrib><creatorcontrib>Riaz, Rabia</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yaqub, Nazish</au><au>Rizvi, Sanam Shahla</au><au>Chung, Tae Sun</au><au>Riaz, Rabia</au><au>Li, Huaizhi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>BAS: The Biphase Authentication Scheme for Wireless Sensor Networks</atitle><jtitle>Security and communication networks</jtitle><date>2017-01-01</date><risdate>2017</risdate><volume>2017</volume><issue>2017</issue><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2017/7041381</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0001-5992-1136</orcidid><orcidid>https://orcid.org/0000-0003-4694-3250</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2017-01, Vol.2017 (2017), p.1-10
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2455785454
source Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals
subjects Communication
Denial of service attacks
Energy
Messages
Nodes
Security management
Sensors
Wireless networks
Wireless sensor networks
title BAS: The Biphase Authentication Scheme for Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T01%3A20%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=BAS:%20The%20Biphase%20Authentication%20Scheme%20for%20Wireless%20Sensor%20Networks&rft.jtitle=Security%20and%20communication%20networks&rft.au=Yaqub,%20Nazish&rft.date=2017-01-01&rft.volume=2017&rft.issue=2017&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2017/7041381&rft_dat=%3Cproquest_cross%3E2455785454%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455785454&rft_id=info:pmid/&rfr_iscdi=true