Open Access
ARTICLE
Lightweight Key Management Scheme Using Fuzzy Extractor for Wireless Mobile Sensor Network
1 Department of Software Engineering, Foundation University, Islamabad, 44000, Pakistan
2 Centre Informatique, Universite Gamal Abdel Nasser de, Conakry, Guinea
3 Department of Software Engineering, Bahria University Islamabad Campus, Islamabad, Pakistan
4 GDC Ahmad Karak, Higher Education Department, Khyber Pakhtunkhwa, Pakistan
5 Department of Electrical and Computer Engineering, Dhofar University, Salalah, Oman
6 Department of Software, Sejong University, Seoul, 05006, Korea
* Corresponding Author: Oh-Young Song. Email:
Computers, Materials & Continua 2022, 71(1), 1695-1712. https://doi.org/10.32604/cmc.2022.021641
Received 09 July 2021; Accepted 20 August 2021; Issue published 03 November 2021
Abstract
The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance. All such types of applications based on wireless mobile sensor network are generally using real time data, most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network. This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station. But this leads to a serious security breach and degrades the performance of any security protocol available in this domain. Most existing schemes for authentication and cluster key management for external users, exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster head. This increase communication cost and delay in such real time access information. To handle this critical issue in cluster wireless mobile sensor network, we propose a lightweight authentication and key management scheme using a fuzzy extractor. In this scheme, any external user can access data directly from the cluster head of any cluster without the involvement of the base station. The proposed scheme only uses the one-way hash functions and bitwise XOR operations, apart from the fuzzy extractor method for the user biometric verification at the login phase. The presented scheme supports scalability for an increasing number of nodes using polynomials. The proposed scheme increases the life-time of the network by decreasing the key pool size.
Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.