Abstract
Unlike regular wireless networks like Mobile Ad hoc NETworks (MANET) can be exploited instinctively devoid of necessitating any centralized administration or available network infrastructure. In such networks, the mobile nodes perform as relays to assist multi-hop communications and, in most cases, they are accountable for the entire networking functions. MANET is a very challenging task owing to the actuality that these systems may be subjected to attacks causing the network malicious. Among single- server and multi-server authentications, this paper intends to focus on multi-server authentication process in MANET or WSN or any heterogeneous network, which includes a secure protocol that provides a proper communication link between the nodes. In a single server network, both the credentials and authenticating procedure are handled by a single server. On the other hand, in a multi-server network, the credentials and authenticating procedure are handled by separate servers, and hence practically it is more robust against attacks. Hence, this paper develops a security protocol using Elliptic Curve Cryptography (ECC) in prime field. By adopting hash function, a secure way for key exchange is provided. Before transmitting the message from one node to another, it has to be ensured whether it is an authorized node or not. For authorizing purpose, a novel authenticating algorithm is developed based on two servers, a master server and normal server. Accordingly, the credentials and the processing steps are separated in such a way that compromising one of the servers never pose any threat to the whole authentication system. Initially, a node should register its credentials to the register centre, and those credentials are distributed to the server by a secure distribution algorithm where no hacking could be possible. The implemented technique is analyzed in terms of cost and security, and the results are obtained.
Similar content being viewed by others
References
Hamouid, K., & Adi, K. (2015). Efficient certificateless web-of-trust model for public-key authentication in MANET. Computer Communications, 63, 24–39.
Yeun, C. Y., Han, K., Vo, D. L., & Kim, K. (2008). Secure authenticated group key agreement protocol in the MANET environment. Information Security Technical Report, 13(3), 158–164.
Li, X., Niu, J., Kumari, S., Wu, F., & Choo, K. K. R. (2017). A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications, 103, 194–204.
Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147–169.
Ramachandran, S., & Shanmugam, V. (2017). A two way authentication using bilinear mapping function for wireless sensor networks. Computers & Electrical Engineering, 59, 242–249.
Wu, F., Xu, L., Kumari, S., Li, X., & Das, A. K. (2017). An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. Journal of Network and Computer Applications, 89, 72–85.
Wu, F., Li, X., Sangaiah, A. K., Xu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727–737.
Amin, R., & Biswa, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58–80.
Hu, C.-C., Lai, C.-F., Hou, J.-G., & Huang, Y.-M. (2017). Timely scheduling algorithm for P2P streaming over MANETs. Computer Networks, 127, 56–67.
Shah, N., Abid, S. A., Qian, D., & Mehmood, W. (2017). A survey of P2P content sharing in MANETs. Computers & Electrical Engineering, 57, 55–68.
Sarkar, S., & Datta, R. (2017). A game theoretic framework for stochastic multipath routing in self-organized MANETs. Pervasive and Mobile Computing, 39, 117–134.
Usha, G., RajeshBabu, M., & SaravanaKumar, S. (2017). Dynamic anomaly detection using cross layer security in MANET. Computers & Electrical Engineering, 59, 231–241.
AlMojamed, M., & Kolberg, M. (2016). Structured peer-to-peer overlay deployment on MANET: a survey. Computer Networks, 96, 29–47.
Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2018). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 90–100.
Azni, A. H., Ahmad, R., Noh, Z. A. M., Hazwani, F., & Hayaati, N. (2015). Systematic review for network survivability analysis in MANETS. Procedia - Social and Behavioral Sciences, 195, 1872–1881.
Qiu, T., Chen, N., Li, K., Qiao, D., & Fu, Z. (2017). Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Networks, 55, 143–152.
Xu, Y., Liu, J., Shen, Y., Jiang, X., & Shiratori, N. (2017). Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Computer Networks, 123, 77–87.
Banerjee, A., King, C.-T., & Hsiao, H.-C. (2017). On state maintenance in cluster-based mobile ad-hoc networks. Ad Hoc Networks, 66, 95–109.
Halunen, K., Häikiö, J., & Vallivaara, V. (2017). Evaluation of user authentication methods in the gadget-free world. Pervasive and Mobile Computing, 40, 220–241.
Kumar, V., Park, J. M., & Bian, K. (2017). Transmitter authentication using hierarchical modulation in dynamic spectrum sharing. Journal of Network and Computer Applications, 91, 52–60.
Chang, C.-C., Wu, H.-L., & Sun, C.-Y. (2017). Notes on “Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 38, 275–278.
Pérez-Caballero, G., Andrade, J. M., Olmos, P., Molina, Y., & Miguel-Cruz, F. (2017). Authentication of tequilas using pattern recognition and supervised classification. TrAC Trends in Analytical Chemistry, 94, 117–129.
Shankar, V., Singh, K., & Kumar, A. (2016). IPCT: A scheme for mobile authentication. Perspectives in Science, 8, 522–524.
Ugrovatov, A., Bakhtin, A., Volkov, A., Galenko, V., & Muratchaev, S. (2016). Using scenarios for performance analysis of MANET protocols in space operations. In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 374–376), Kumaracoil.
Alam Siddiquee, K. N. E., Khan, F. F., Andersson, K., & Hossain, M. S. (2017). Optimal dynamic routing protocols for agro-sensor communication in MANETs. In 2017 14th IEEE annual consumer communications & networking conference (CCNC) (pp. 1–5), Las Vegas, NV.
Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37–48.
Wu, F., Xu, L., Kumari, S., Li, X., Das, A. K., Khan, M. K., et al. (2016). A novel and provablysecure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks, 9, 3527–3542.
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14, 10081–10106.
He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263–277.
Shankar, A., & Jaisankar, N. (2016). A novel energy efficient clustering mechanism in wireless sensor network. Procedia Computer Science, 89, 134–141.
Sherifi, I., & Senja, E. (2018). Internet usage on mobile devices and their impact on evolution of informative websites in Albania. European Journal of Business, 3(6), 37–43.
Madhusudhan, R., Hegde, M., & Memon, I. (2018). A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card. International Journal of Communication Systems. https://doi.org/10.1002/dac.3701.
Akhtar, R., Shengua, Y., Zhiyu, Z., Khan, Z. A., Memon, I., Ur Rehman, S., et al. (2019). Content distribution and protocol design issue for mobile social networks: a survey. EURASIP Journal on Wireless Communications and Networking, 1, 128.
Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chilveri, P.G., Nagmode, M.S. A novel node authentication protocol connected with ECC for heterogeneous network. Wireless Netw 26, 4999–5012 (2020). https://doi.org/10.1007/s11276-020-02358-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-020-02358-4