A Hierarchical Authentication Scheme in Wireless Sensor Networks

被引:1
|
作者
Wu, Bing [1 ]
机构
[1] Fayetteville State Univ, Dept Math & Comp Sci, Fayetteville, NC 28301 USA
关键词
D O I
10.1109/MASS.2014.110
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A wireless sensor network (WSN) refers to a group of autonomous sensors capable of collecting environmental conditions such as temperature, humidity, and pressure. In addition, WSNs may be deployed in a risky region where sensor nodes are equipped to track suspicious targets and monitor harmful activities. In such scenarios, security is crucial and challenging. Such applications require top security, such as authentication, confidentiality, and integrity. In this paper, we focus on the authentication service in wireless senor network. Authentication is validity of entities and is considered the first line of defense against malicious attacks. With high security requirements, we assume sensor nodes are equipped with sufficient resources and are capable of performing advanced cryptographic operations. We propose a simple authentication protocol for wireless sensor networks based on distributed clustering and asymmetric cryptographic algorithms.
引用
收藏
页码:630 / 635
页数:6
相关论文
共 50 条
  • [1] Security and authentication scheme for hierarchical wireless sensor networks
    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
    不详
    Dongnan Daxue Xuebao, 2008, SUPPL. 1 (243-248): : 243 - 248
  • [2] HSKAS: A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks
    Sun, Zeyu
    Ji, Xiaohui
    Li, Yuanbo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 105 - 116
  • [3] User Authentication for Hierarchical Wireless Sensor Networks
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 203 - 208
  • [4] Lightweight Authentication scheme for wireless sensor networks
    Huang, Chih-Hung
    Wu, Hsuan-Hsun
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Pan, Chung-Long
    Chu, Shao-, I
    Chen, Po-Ying
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [5] An authentication scheme for clustered wireless sensor networks
    He, Li-Li
    Lou, Xiao-Chun
    Sensors and Transducers, 2013, 153 (06): : 166 - 170
  • [6] A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sharma, Pranay
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1646 - 1656
  • [7] A reversible watermarking authentication scheme for wireless sensor networks
    Shi, Xi
    Xiao, Di
    INFORMATION SCIENCES, 2013, 240 : 173 - 183
  • [8] Enhanced User Authentication Scheme for Wireless Sensor Networks
    Park, Hee-Joo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 367 - 374
  • [9] An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks
    Mbarek, Bacem
    Meddeb, Aref
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017), 2017, 109 : 553 - 559
  • [10] A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks
    Xu, Lin
    Wen, Mi
    Li, Jinguo
    2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 200 - 204