A user authentication and key agreement scheme for heterogeneous wireless sensor networks

被引:0
|
作者
Yan L.-L. [1 ]
Chang Y. [1 ]
Zhang S.-B. [1 ]
机构
[1] College of Information Security Engineering, Chengdu University of Information Technology, Chengdu
关键词
Authentication; Heterogeneous wireless sensor networks; Internet of things; Key agreement; Security protocol;
D O I
10.3969/j.issn.1001-0548.2017.01.009
中图分类号
学科分类号
摘要
Security and privacy are main restriction factors in the development of the Internet of Things(IOT). The external users need to directly access the sensor nodes to get data in IOT. In order to protect the security of data, we propose a user authentication and key agreement scheme based on heterogeneous wireless sensor networks. The proposed scheme can verify the identity of participants and establish a shared key between the user and senor node. The detailed analysis of the proposed scheme shows that the scheme is secure and efficient. © 2017, Editorial Board of Journal of the University of Electronic Science and Technology of China. All right reserved.
引用
收藏
页码:55 / 60
页数:5
相关论文
共 21 条
  • [1] Hu Y.-L., Sun Y.-F., Yin B.-C., Information sensing and interaction technology in Internet of things, Chinese Journal of Computers, 35, 6, pp. 1147-1163, (2012)
  • [2] Qian Z.-H., Wang Y.-J., Internet of things-oriented wireless sensor networks review, Journal of Electronics & Information Technology, 35, 1, pp. 215-227, (2013)
  • [3] Romer K., Mattern F., The design space of wireless sensor networks, Wireless Commun, IEEE, 11, 6, pp. 54-61, (2004)
  • [4] Duarte-Melo E.J., Liu M., Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks, Proceedings of the GLOBECOM 2002, pp. 21-25, (2002)
  • [5] Akyildiz I.F., Su W., Sankarasubramaniam Y., Et al., Wireless sensor networks: a survey, Comput Netw, 38, 4, pp. 393-422, (2002)
  • [6] Ozdemir S., Xiao Y., Secure data aggregation in wireless sensor networks: a comprehensive overview, Comput Netw, 53, 12, pp. 2022-2037, (2009)
  • [7] Benenson Z., Gartner F., Kesdogan D., User authentication in sensor network, Proceedings of Informatik Workshop on Sensor Networks, pp. 385-389, (2004)
  • [8] Watro R., Kong D., Cuti S., TinPK: Securing sensor networks with public key technology, Proceedings of ACM Workshop Security of Ad Hoc Sensor Networks, pp. 59-64, (2010)
  • [9] Das M.L., Two-factor user authentication in wireless sensor networks, IEEE Trans Wireless Comm, pp. 1086-1090, (2009)
  • [10] Xu J., Zhu W.T., Feng D.G., An improved smart card based password authentication scheme with provable security, Comput Stand Interf, 31, 4, pp. 723-728, (2009)