A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

被引:84
|
作者
Shi, Wenbo [1 ]
Gong, Peng [2 ]
机构
[1] Northeastern Univ Qinhuangdao, Dept Elect Engn, Qinhuangdao 066004, Peoples R China
[2] Beijing Inst Technol, Natl Key Lab Mechatron Engn & Control, Sch Mechatron Engn, Beijing 100081, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
CRYPTANALYSIS; SCHEME;
D O I
10.1155/2013/730831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication in wireless sensor networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environments is a paramount security concern. To overcome the weaknesses of Yeh et al.'s protocol, we proposed a new authentication protocol for wireless sensor networks using elliptic curves cryptography. The comparisons show that our protocol is more suitable for WSNs.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks
    Pan, Tian-Yang
    Chen, Li-Quan
    Zhang, Yuan-Fang
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 632 - 635
  • [32] A User Authentication Protocol Combined With Trust Model and ECC for Wireless Sensor Networks
    Liu, Tao
    Huang, Gan
    Xu, Zheng
    [J]. 2016 IEEE 15TH INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS & COGNITIVE COMPUTING (ICCI*CC), 2016, : 451 - 458
  • [33] A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
    Mo, Jiaqing
    Chen, Hang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [34] Authentication in Wireless Sensor Networks Using Zero Knowledge Protocol
    Hashim, Muneera
    Kumar, Santhosh G.
    Sreekumar, A.
    [J]. COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 416 - 421
  • [35] User Authentication for Hierarchical Wireless Sensor Networks
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    [J]. 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 203 - 208
  • [36] A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks
    Louw, J.
    Niezen, G.
    Ramotsoela, T. D.
    Abu-Mahfouz, A. M.
    [J]. 2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1166 - 1170
  • [37] An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
    Rajeswari, P. G.
    Thilagavathi, K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 176 - 185
  • [38] Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform
    Gulen, Utku
    Baktir, Selcuk
    [J]. SENSORS, 2020, 20 (05)
  • [39] Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
    Park, YoHan
    Park, YoungHo
    [J]. SENSORS, 2016, 16 (12)
  • [40] An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
    Wang, Chenyu
    Xu, Guoai
    Sun, Jing
    [J]. SENSORS, 2017, 17 (12)