NEWS

THE IMPACT OF MOBILITY MODELS ON THE PERFORMANCE OF AUTHENTICATION SERVICES IN WIRELESS SENSOR NETWORKS


(Received: 20-Jul-2019, Revised: 3-Nov-2019 , Accepted: 30-Nov-2019)
The applications of Wireless Sensor Networks (WSNs) are very important nowadays and could be found in many different life aspects. Broadcast authentication (BA) protocols are solutions to guarantee that commands and requests sent by the Base Station (BS), which controls the services provided by WSN, are authentic. Network mobility is considered one of the main challenges that WSN services in general and authentication protocols in particular are facing. Existing BA protocols did not give much attention to the effect of mobile BS or/and sensors on the behaviour of their protocols. Consequently, this paper provides a deep analysis of the impact of mobility on the performance of BA protocols. Three standard designs for BA protocols were studied in this research; Forwarding First (FF), Authentication First (AF) and Adaptive Window (AW). These three standard protocols were examined against four major mobility models. The results revealed that BA protocols behaved differently in terms of energy consumption and network delay with respect to mobility. For example, the delay in AW protocol was decreased by 47.6% in case of having fully mobile WSN; whereas the wasted energy was reduced by 37.5% in case of static BS and mobile sensors. Although the same authentication technique was applied in all three protocols, the mobility itself was a reason to enhance or degrade the performance of the authentication service which consequently affects the security of WSNs and their provided services. For example, when the BS was mobile and the sensor nodes were static, FF protocol decreased the delay by up to 98.81% compared to AF protocol and by up to 93.62% compared to AW protocol. On the other hand, AW Protocol saved the network energy by up to 94.49% compared to FF protocol and by up to 65.5% compared to AF protocol.

[1] B. Mbarek, A. Meddeb, W. Ben Jaballah and M. Mosbah, "A Broadcast Authentication Scheme in IoT Environments," Proc. of the 13th IEEE International Conference of Computer Systems and Applications (AICCSA), Dec. 2016.

[2] F. Wu, X. Li, A. K. Sangaiah, L. Xu, S. Kumari and L. Wu, "A Lightweight and Robust Two-factor Authentication Scheme for Personalized Healthcare Systems Using Wireless Medical Sensor Networks," Future Generation Computer System, vol. 82, pp. 727-737, 2018.

[3] Th. Arampatzis, J. Lygeros and S. Manesis, "A Survey of Applications of Wireless Sensors and Wireless Sensor Networks," Proc. of the 13th Mediterranean Conference on Control and Automation, pp. 719-724, 2005.

[4] O. B. Mora, R. Rivera, V. M. Larios, J. R. Beltrán-Ramírez, R. Maciel and A. Ochoa, "A Use Case in Cybersecurity Based in Blockchain to Deal with the Security and Privacy of Citizens and Smart Cities Cyberinfrastructures," IEEE International Smart Cities Conference (ISC2), Sept. 2018.

[5] A. Founoun and A. Hayar, "Evaluation of the concept of the smart city through local regulation and the importance of local initiative", IEEE International Smart Cities Conference (ISC2), USA, Sept. 2018.

[6] P.-A. Mohandas, J. S. A. Dhanaraj and X.-Z. Gao, "Artificial Neural Network based Smart and Energy Efficient Street Lighting System: A Case Study for Residential Area in Hosur," Elsevier, Sustainable Cities and Society, vol. 48, July 2019.

[7] D. J. A. Lewis, "The SMART University: The Transformational Role of Learning Analytics," Information and Learning Science, vol. 119, no. 12, pp. 758-760, 2018.

[8] H. Sharma and G. Kaur, "Optimization and Simulation of Smart Grid Distributed Generation: A Case Study of University Campus," IEEE Smart Energy Grid Engineering (SEGE), Aug. 2016.

[9] K. Sundus and I. Almomani, "Mobility Effect on the Authenticity of Wireless Sensor Networks," Proc. of IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, April 2019.

[10] H. Singh and D. Singh, "Taxonomy of Routing Protocols in Wireless Sensor Networks: A Survey," Proc. of the 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 822-830, 2016.

[11] I. Almomani and M. Saadeh, "FEAR: Fuzzy-based Energy Aware Routing Protocol for Wireless Sensor Networks," International Journal of Communications, Networks and System Sciences, vol. 4, no. 6, pp. 403-415, June 2011.

[12] M. Kocakulak and I. Butun, "An Overview of Wireless Sensor Networks towards Internet of Things," Proc. of the 7th IEEE Annual Computing and Communication Workshop and Conference (CCWC), pp. 1-6, 9-11 January 2017.

[13] P. Rawat, K. D. Singh, H. Chaouchi and J. M. Bonnin, "Wireless Sensor Networks: A Survey on Recent Developments and Potential Synergies," Journal of Supercomputing, vol. 68, no. 1, pp. 1–48, April, 2014.

[14] S. K. Gupta and P. Sinha, "Overview of Wireless Sensor Network: A Survey," International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 1, pp. 5201-5207, Jan. 2014.

[15] M. R. Ahmed, X. Huang, D. Sharma and H. Cui, "Wireless Sensor Networks: Characteristics and Architectures," International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 6, no. 12, pp. 1398-1401, 2012.

[16] W. B. Jaballah, M. Mosbah, H. Youssef and A. Zemmari, "Lightweight Secure Group Communications for Resource Constrained Devices," International Journal of Space- based and Situated Computing, vol. 5, no. 4, pp. 187-200, 2015.

[17] N. K. Mittal, "A Survey on Wireless Sensor Network for Community Intrusion Detection Systems," Proc. of the 3rd IEEE Int'l Conf. on Recent Advances in Information Technology, 2016.

[18] S. Patil, V. Kumar B. P., S. Singh and R. Jamil, "A Survey on Authentication Techniques for Wireless Sensor Networks," International Journal of Applied Engineering Research, vol. 7, no.11, 2012.

[19] B. Mbarek, A. Mddeb, W. Ben Jaballah and M. Mosbah, "An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks," Procedia Computer Science, vol. 109C, pp. 553-559, 2017.

[20] K. Grover and A. Lim, "A Survey of Broadcast Authentication Schemes for Wireless Networks," ELSEVIR Ad Hoc Networks, Part A, vol. 24, pp. 288-316, January 2015.

[21] M. Jan, P. Nanda, M. Usman and X. He, "Pawn: A Payload-based Mutual Authentication Scheme for Wireless Sensor Networks," Concurrency and Computation: Practice and Experiance, vol. 29, no. 17, 2016.

[22] V. Khanaa, K. Thooyamani and R. Udayakumar, "A Secure and Efficient Authentication System for Distributed Wireless Sensor Network," World Applied Science Journal (Computer Sceince, Engineering and Its Applications), pp. 304-308, 2014.

[23] I. Almomani and M. Alenezi, "Efficient Denial of Service Attacks Detection in Wireless Sensor Networks," Journal of Information Science and Engineering, vol. 34, no. 4, pp. 977-1000, 2018.

[24] J. P. Walters, Z.-Q. Liang, W.-S. Shi and V. Chaudhary, "Wireless Sensor Network Security: A Survey," Security in Distributed, Grid and Pervasive Computing, p. 367, 2006.

[25] H. Huang, T. Gong, T. Chen, M.-L. Xiong, X.-X. Pan and T. Dai, "An Improved ???? TESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs," Journal of Sensors, p. 13, 2016.

[26] M. R. Kumar and C. S. G. Dhas, "An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks," International Journal of Engineering and Technology (IJET), vol. 5, no. 5, pp. 3992-4001, Nov. 2013.

[27] B. Bezawada, S. Kulkarni and I. Ray, "Independent Key Distribution Protocols for Broadcast Authentication," Symposium on Access Control Models and Technologies (SACMAT 18), pp. 27-38, 13-15 June 2018.

[28] R. Ali, A. K. Pal, S. Kumari, M Karuppiah and M. Conti, "A Secure User Authentication and Key-agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring," Future Generation Computer Systems, vol. 84, pp. 200-2015, 2018.

[29] S. Challa, A. Kumar Das, V. Odelu, N. Kumar, S. Kumari, M. K. Khan and A. V. Vasilakos, "An Efficient ECC-based Provably Secure Three-factor User Authentication and Key Agreement Protocol for Wireless Healthcare Sensor Networks," Computers and Electrical Engineering, vol. 69, pp. 534-554, July 2018.

[30] C. Ioannou, V. Vassiliou and C. Sergiou, "An Intrusion Detection System for Wireless Sensor Networks," Proc. of the 24th International Conference on Telecommunications (ICT), 3-5 May 2017.

[31] I. Butun, S. D. Morgera and R. Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, pp. 266 - 282, May 2013.

[32] Krontiris, Intrusion Prevention and Detection in Wireless Sensor Networks, PhD Thesis, Naturwissenschaften der Universit¨at Mannheim, Mannheim, 2008.

[33] O. Karajeh, Securing Wireless Sensor Networks Against Denial of Service Attacks, Thesis for the Master’s Degree of Computer Science, 2010.

[34] K. Han and T. Shon, "Sensor Authentication in Dynamic Wireless Sensor Network Envionments," International Journal of RFID Security and Cryptography (IJRFIDSC), vol. 1, no. 1/2, 2012.

[35] R. Maidhili and G. M. Karthik, "Energy Efficient and Secure Multi-user Broadcast Authentication Scheme in Wireless Sensor Networks," Proc. of IEEE International Conference on Computer Communication and Informatics (ICCCI), Jan. 2018.

[36] D.-H. Lee and I.-Y. Lee, "ECDSA-based Broadcast Authentication Scheme for Smart Home Environments," Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 10, no. 4, pp. 81-86, 2018.

[37] H. Bashirpour, S. Bashirpour, S. Shamshirband and A. Chronopoulos, "An Improved Digital Signature Protocol to Multi-user Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs)," Mathematical and Computational Applications, vol. 23, no. 2, pp.17, 2018.

[38] K.-A. Shim, "BASIS: A Practical Multi-user Broadcast Authentication Scheme in Wireless Sensor Networks," IEEE Trans. on Information Forensics and Security, vol. 12, no. 7, pp. 1545-1554, 2017.

[39] C.-Y. Cheng, I.-C. Lin and S.-Y. Huang, "An RSA-like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks," International Journal of Distributed Sensor Networks, vol. 11, no. 9, A. ID. 743623, pp. 1-11, 2015.

[40] L. Xu, M. Wen and J. Li, "A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks," Proc. of IEEE Conference on Collaboration and Internet Computing (CIC), pp. 200-204, 2015.

[41] W. Ronghua, D. Wenliang and N. Peng, "Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks," Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 71-79, 2007.

[42] I. Almomani, O. Karajeh and L. Abdullah, "Reducing the Vulnerability of Broadcast Authentication against Denial of Service Attacks in Wireless Sensor Networks," The Mediterranean Journal of Computer and Networks, vol. 7, no. 2, 2011.

[43] V. Ramasamy, "Mobile Wireless Sensor Networks: An Overview," Wireless Sensor Networks, [Online], Available: https://www.intechopen.com/books/wireless-sensor-networks-insights-and-innovations/mobile-wireless-sensor-networks-an-overview, October 4th, 2017.

[44] S. M. Mohamed, H. S. Hamza and I. A. Saroit, "Coverage in Mobile Wireless Sensor Networks (M-WSN): A Survey," Computer Communications, vol. 110, pp. 133-150, 15 September 2017.

[45] J. Rezazadeh, M. Moradi and A. S. Ismail, "Mobile Wireless Sensor Networks Overview," International Journal of Computer Communications and Networks (IJCCN), vol. 2, no. 1, February 2012.

[46] N. Ghosh and I. Banerjee, "Application of Mobile Sink in Wireless Sensor Networks," Proc. of the 10th International Conference on Communication Systems & Networks (COMSNETS), 3-7 Jan. 2018.

[47] P. Zhong and F. Ruan, "Application of Mobile Sink in Wireless Sensor Networks Study on the Effect of Sink Moving Trajectory on Wireless Sensor Networks," Proc. of IOP Conference Series: Materials Science and Engineering, vol. 323, 2018.

[48] Scalable Network Technologies, "Qualnet 5.0, Qualnet Network Simulator," [Online], Available: https://www.scalable-networks.com/qualnet-network-simulation.

[49] L. Kumar, "Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size," International Journal of Engineering Research and Applications (IJERA), vol. 2, pp. 87-92, 2012.

[50] T. Javed and S. Zafar, "Delay Analysis of Manet Routing Protocols," World Applied Science Journal, vol. 19, no. 5, pp. 615-520., 2012.

[51] J. Banerjee, S. K. Mitra and M. K. Naskar, "Comparative Study of Radio Models for Data Gathering in Wireless Sensor Networks," International Journal of Computer Applications, vol. 27, no. 4, 2011.

[52] W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-efficient Communication Protocol for Wireless Microsensor Networks," Proceeding of the 33rd IEEE Annual Hawaii International Conference on System Science, vol. 2, no. 10, 2000.

[53] H. Aljawawdeh, I. Almomani, "Dynamic load balancing protocol (DLBP) for wireless sensor networks", IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), pp. 1–6, 3-5 Dec. 2013.

[54] H. G. Goh, M. L. Sim and H. T. Ewe, "Energy Efficient Routing for Wireless Sensor Networks with Grid Topology," International Federation for Information Processing (IFIP), pp. 834-843, 2006.

[55] I. Almomani, M. Saadeh, M. AL-Akhras, and H. AL Jawawdeh, “A Tree-Based Power Saving Routing Protocol for Wireless Sensor Networks”, International Journal of Computers and Communications, Vol. 5, no. 2, pp. 84-92, 2011.

[56] I. Almomani and M. Saadeh, "Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation," KSII Transactions on Internet and Information Systems (TIIS), vol. 6, no. 4, pp. 1223-1247, 2012.