Pseudonymous mobile node reauthentication scheme for mobile wireless sensor networks

Bo Sung Kim, Joo Seok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Mobile wireless sensor networks (MWSNs) are a new type of wireless sensor network (WSN) where sensor nodes are mobile. Compared to static WSNs, MWSNs provide many advantages, but the mobility introduces a problem of frequent reauthentication. To efficiently resolve this problem, several mobile node reauthentication schemes based on symmetric key cryptography have been proposed. However, most of the existing schemes do not preserve identity privacy of the mobile node and allow an adversary to track the movement of the mobile node. In this paper, we propose a pseudonymous mobile node reauthentication scheme for MWSNs that provides a mobile node reauthentication mechanism preserving the identity privacy of the mobile node. Furthermore, our scheme considers the node rejoin situation which was not considered in previous studies. By providing a simple reauthentication process for the node rejoin, our scheme reduces the energy consumption and latency in the reauthentication.

Original languageEnglish
Title of host publicationICIT 2019 - Proceedings of the 7th International Conference on Information Technology
Subtitle of host publicationIoT and Smart City
PublisherAssociation for Computing Machinery
Pages294-299
Number of pages6
ISBN (Electronic)9781450376631
DOIs
Publication statusPublished - 2019 Dec 20
Event7th International Conference on Information Technology: IoT and Smart City, ICIT 2019 - Shanghai, China
Duration: 2019 Dec 202019 Dec 23

Publication series

NameACM International Conference Proceeding Series

Conference

Conference7th International Conference on Information Technology: IoT and Smart City, ICIT 2019
CountryChina
CityShanghai
Period19/12/2019/12/23

All Science Journal Classification (ASJC) codes

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Fingerprint Dive into the research topics of 'Pseudonymous mobile node reauthentication scheme for mobile wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Kim, B. S., & Song, J. S. (2019). Pseudonymous mobile node reauthentication scheme for mobile wireless sensor networks. In ICIT 2019 - Proceedings of the 7th International Conference on Information Technology: IoT and Smart City (pp. 294-299). (ACM International Conference Proceeding Series). Association for Computing Machinery. https://doi.org/10.1145/3377170.3377207