Skip to main content
Log in

A novel node authentication protocol connected with ECC for heterogeneous network

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Unlike regular wireless networks like Mobile Ad hoc NETworks (MANET) can be exploited instinctively devoid of necessitating any centralized administration or available network infrastructure. In such networks, the mobile nodes perform as relays to assist multi-hop communications and, in most cases, they are accountable for the entire networking functions. MANET is a very challenging task owing to the actuality that these systems may be subjected to attacks causing the network malicious. Among single- server and multi-server authentications, this paper intends to focus on multi-server authentication process in MANET or WSN or any heterogeneous network, which includes a secure protocol that provides a proper communication link between the nodes. In a single server network, both the credentials and authenticating procedure are handled by a single server. On the other hand, in a multi-server network, the credentials and authenticating procedure are handled by separate servers, and hence practically it is more robust against attacks. Hence, this paper develops a security protocol using Elliptic Curve Cryptography (ECC) in prime field. By adopting hash function, a secure way for key exchange is provided. Before transmitting the message from one node to another, it has to be ensured whether it is an authorized node or not. For authorizing purpose, a novel authenticating algorithm is developed based on two servers, a master server and normal server. Accordingly, the credentials and the processing steps are separated in such a way that compromising one of the servers never pose any threat to the whole authentication system. Initially, a node should register its credentials to the register centre, and those credentials are distributed to the server by a secure distribution algorithm where no hacking could be possible. The implemented technique is analyzed in terms of cost and security, and the results are obtained.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Hamouid, K., & Adi, K. (2015). Efficient certificateless web-of-trust model for public-key authentication in MANET. Computer Communications, 63, 24–39.

    Article  Google Scholar 

  2. Yeun, C. Y., Han, K., Vo, D. L., & Kim, K. (2008). Secure authenticated group key agreement protocol in the MANET environment. Information Security Technical Report, 13(3), 158–164.

    Article  Google Scholar 

  3. Li, X., Niu, J., Kumari, S., Wu, F., & Choo, K. K. R. (2017). A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications, 103, 194–204.

    Article  Google Scholar 

  4. Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147–169.

    Article  Google Scholar 

  5. Ramachandran, S., & Shanmugam, V. (2017). A two way authentication using bilinear mapping function for wireless sensor networks. Computers & Electrical Engineering, 59, 242–249.

    Article  Google Scholar 

  6. Wu, F., Xu, L., Kumari, S., Li, X., & Das, A. K. (2017). An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. Journal of Network and Computer Applications, 89, 72–85.

    Article  Google Scholar 

  7. Wu, F., Li, X., Sangaiah, A. K., Xu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727–737.

    Article  Google Scholar 

  8. Amin, R., & Biswa, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58–80.

    Article  Google Scholar 

  9. Hu, C.-C., Lai, C.-F., Hou, J.-G., & Huang, Y.-M. (2017). Timely scheduling algorithm for P2P streaming over MANETs. Computer Networks, 127, 56–67.

    Article  Google Scholar 

  10. Shah, N., Abid, S. A., Qian, D., & Mehmood, W. (2017). A survey of P2P content sharing in MANETs. Computers & Electrical Engineering, 57, 55–68.

    Article  Google Scholar 

  11. Sarkar, S., & Datta, R. (2017). A game theoretic framework for stochastic multipath routing in self-organized MANETs. Pervasive and Mobile Computing, 39, 117–134.

    Article  Google Scholar 

  12. Usha, G., RajeshBabu, M., & SaravanaKumar, S. (2017). Dynamic anomaly detection using cross layer security in MANET. Computers & Electrical Engineering, 59, 231–241.

    Article  Google Scholar 

  13. AlMojamed, M., & Kolberg, M. (2016). Structured peer-to-peer overlay deployment on MANET: a survey. Computer Networks, 96, 29–47.

    Article  Google Scholar 

  14. Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2018). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 90–100.

    Google Scholar 

  15. Azni, A. H., Ahmad, R., Noh, Z. A. M., Hazwani, F., & Hayaati, N. (2015). Systematic review for network survivability analysis in MANETS. Procedia - Social and Behavioral Sciences, 195, 1872–1881.

    Article  Google Scholar 

  16. Qiu, T., Chen, N., Li, K., Qiao, D., & Fu, Z. (2017). Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Networks, 55, 143–152.

    Article  Google Scholar 

  17. Xu, Y., Liu, J., Shen, Y., Jiang, X., & Shiratori, N. (2017). Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Computer Networks, 123, 77–87.

    Article  Google Scholar 

  18. Banerjee, A., King, C.-T., & Hsiao, H.-C. (2017). On state maintenance in cluster-based mobile ad-hoc networks. Ad Hoc Networks, 66, 95–109.

    Article  Google Scholar 

  19. Halunen, K., Häikiö, J., & Vallivaara, V. (2017). Evaluation of user authentication methods in the gadget-free world. Pervasive and Mobile Computing, 40, 220–241.

    Article  Google Scholar 

  20. Kumar, V., Park, J. M., & Bian, K. (2017). Transmitter authentication using hierarchical modulation in dynamic spectrum sharing. Journal of Network and Computer Applications, 91, 52–60.

    Article  Google Scholar 

  21. Chang, C.-C., Wu, H.-L., & Sun, C.-Y. (2017). Notes on “Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 38, 275–278.

    Article  Google Scholar 

  22. Pérez-Caballero, G., Andrade, J. M., Olmos, P., Molina, Y., & Miguel-Cruz, F. (2017). Authentication of tequilas using pattern recognition and supervised classification. TrAC Trends in Analytical Chemistry, 94, 117–129.

    Article  Google Scholar 

  23. Shankar, V., Singh, K., & Kumar, A. (2016). IPCT: A scheme for mobile authentication. Perspectives in Science, 8, 522–524.

    Article  Google Scholar 

  24. Ugrovatov, A., Bakhtin, A., Volkov, A., Galenko, V., & Muratchaev, S. (2016). Using scenarios for performance analysis of MANET protocols in space operations. In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 374–376), Kumaracoil.

  25. Alam Siddiquee, K. N. E., Khan, F. F., Andersson, K., & Hossain, M. S. (2017). Optimal dynamic routing protocols for agro-sensor communication in MANETs. In 2017 14th IEEE annual consumer communications & networking conference (CCNC) (pp. 1–5), Las Vegas, NV.

  26. Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37–48.

    Article  Google Scholar 

  27. Wu, F., Xu, L., Kumari, S., Li, X., Das, A. K., Khan, M. K., et al. (2016). A novel and provablysecure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks, 9, 3527–3542.

    Article  Google Scholar 

  28. Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14, 10081–10106.

    Article  Google Scholar 

  29. He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263–277.

    Article  Google Scholar 

  30. Shankar, A., & Jaisankar, N. (2016). A novel energy efficient clustering mechanism in wireless sensor network. Procedia Computer Science, 89, 134–141.

    Article  Google Scholar 

  31. Sherifi, I., & Senja, E. (2018). Internet usage on mobile devices and their impact on evolution of informative websites in Albania. European Journal of Business, 3(6), 37–43.

    Google Scholar 

  32. Madhusudhan, R., Hegde, M., & Memon, I. (2018). A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card. International Journal of Communication Systems. https://doi.org/10.1002/dac.3701.

    Article  Google Scholar 

  33. Akhtar, R., Shengua, Y., Zhiyu, Z., Khan, Z. A., Memon, I., Ur Rehman, S., et al. (2019). Content distribution and protocol design issue for mobile social networks: a survey. EURASIP Journal on Wireless Communications and Networking, 1, 128.

    Article  Google Scholar 

  34. Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manoj S. Nagmode.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chilveri, P.G., Nagmode, M.S. A novel node authentication protocol connected with ECC for heterogeneous network. Wireless Netw 26, 4999–5012 (2020). https://doi.org/10.1007/s11276-020-02358-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-020-02358-4

Keywords

Navigation