A Study on Authentication of Wireless Sensor Networks based on Hash Function

해쉬 함수 기반의 무선 센서 네트워크 인증에 관한 연구

  • Bae, Sung-Hyun (Dept. of Aviations Information & Communication KyungWoon University) ;
  • Moon, Young-Joon (Dept. of Electronics Engineering, Kyungpook National University) ;
  • Kim, Hae-Mun (Dept. of Materials & Energy Engineering, KyungWoon University)
  • Received : 2017.12.05
  • Accepted : 2017.12.22
  • Published : 2017.12.31


A lot of researches have done for WSN(Wireless Sensor Networks) authentication. Those are divided by whether using certificates or not for the authentication. In this paper, we proposed certificateless protocol. As simplifying the process of authentication, overall the process become faster and the load of the sensor node is decreased. Using the method we proposed, the energy consumption is decreased. That is because instead using keyed hash authentication code(HMAC) simple one way hash function was used. The study confirmed that it could operate on sensor nodes with extremely limited resources and low processing power.

WSN(Wireless Sensor Network)에 대한 인증은 많은 연구가 이루어지고 있다. 인증하는 방법에는 인증서를 사용하는지 여부에 따라 구분할 수 있다. 본 논문에서는 인증서를 사용하지 않는 프로토콜을 제안한다. 인증의 처리과정을 단순화하여 처리속도가 전반적으로 빨라지고, 센서 노드의 부하를 줄일 수 있다. 또한 HMAC(Keyed Hash Authentication Code)을 사용하는 대신에 단순 해쉬 함수를 사용하기 때문에 에너지 소비도 감소될 수 있다. 이 연구는 극히 한정된 자원과 낮은 처리 능력을 가진 센서 노드상에서도 작동할 수 있음을 확인했다.



  1. J. Yick, B. Mukherjee and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol.52, pp. 2292-2330, 2008. DOI:10.1016/j.comnet.2008.04.002
  2. S. Agemura, K. Katayama and H. Ohsaki, "On the effect of Wireless Communication Range Heterogeneity on WSN Performance," International Conference on Information Networking (ICOIN), pp. 35-40, 2017. DOI: 10.1109/ICOIN.2017.7899449
  3. B. Schneier, Applied crypography, John Wiley & Sons Inc., New York edition, 1996.
  4. P. Porambage, C. Schmitt, P. Kumar, A. Gurtov and M. Ylianttila, "Two - phase authentication protocol for wireless sensor networks in distributed IoT applications," in Wireless Communications and Networking Conference (WCNC), pp. 2728-2733, Apr. 2014. DOI: 10.1109/WCNC.2014.6952860
  5. H. Khemissa and D. Tandjaoui, "A Novel Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things," 2016 Wireless Telecommunications Symposium (WTS), London, pp. 1-6, 2016.
  6. A. D. Wood and J. Stankovic "Denial of service in sensor networks," Computer, vol.35, no.10, pp. 54-62, 2002. DOI: 10.1109/MC.2002.1039518
  7. K. Xue, C. Ma, P. Hong and R. Ding "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks," Journal of Network and Computer Applications, vol.36, pp. 316-323, 2012. DOI:10.1016/j.jnca.2012.05.010