A Hierarchical Authentication Scheme in Wireless Sensor Networks

被引:1
|
作者
Wu, Bing [1 ]
机构
[1] Fayetteville State Univ, Dept Math & Comp Sci, Fayetteville, NC 28301 USA
关键词
D O I
10.1109/MASS.2014.110
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A wireless sensor network (WSN) refers to a group of autonomous sensors capable of collecting environmental conditions such as temperature, humidity, and pressure. In addition, WSNs may be deployed in a risky region where sensor nodes are equipped to track suspicious targets and monitor harmful activities. In such scenarios, security is crucial and challenging. Such applications require top security, such as authentication, confidentiality, and integrity. In this paper, we focus on the authentication service in wireless senor network. Authentication is validity of entities and is considered the first line of defense against malicious attacks. With high security requirements, we assume sensor nodes are equipped with sufficient resources and are capable of performing advanced cryptographic operations. We propose a simple authentication protocol for wireless sensor networks based on distributed clustering and asymmetric cryptographic algorithms.
引用
收藏
页码:630 / 635
页数:6
相关论文
共 50 条
  • [21] A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    Lee, Sang-Gon
    Lee, HoonJae
    ETRI JOURNAL, 2013, 35 (05) : 889 - 899
  • [22] An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks
    Zhou, Xiancun
    Xiong, Yan
    INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 266 - 273
  • [23] A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks
    Ko, Lee-Chun
    2008 IEEE INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2008), 2008, : 191 - 195
  • [24] Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks
    Dimitriou, Tassos
    Sabouri, Ahmad
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 409 - 416
  • [25] A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks
    Qin, Danyang
    Jia, Shuang
    Yang, Songxiang
    Wang, Erfu
    Ding, Qun
    JOURNAL OF SENSORS, 2016, 2016
  • [26] Robust Dynamic User Authentication Scheme for Wireless Sensor Networks
    Vaidya, Binod
    Silva, Jorge Sa
    Rodrigues, Joel J. P. C.
    Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 88 - 91
  • [27] An improved dynamic user authentication scheme for wireless sensor networks
    Tseng, Huei-Ru
    Jan, Rong-Hong
    Yang, Wuu
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 986 - 990
  • [28] An Improved Multifactor User Authentication Scheme for Wireless Sensor Networks
    Tyagi, Gaurav
    Kumar, Rahul
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (02) : 1311 - 1343
  • [29] A Secure Authentication and Key Management Scheme for Wireless Sensor Networks
    Khan, Sarmadullah
    Khan, Rafiullah
    SENSOR SYSTEMS AND SOFTWARE, 2015, 143 : 51 - 60
  • [30] Security enhancement of user authentication scheme for wireless sensor networks
    Lee, Yung-Cheng
    Hsieh, Yi-Chih
    You, Peng-Sheng
    Lee, Pei-Ju
    ICIC Express Letters, Part B: Applications, 2014, 5 (02): : 327 - 332