A Hierarchical Authentication Scheme in Wireless Sensor Networks

被引:1
|
作者
Wu, Bing [1 ]
机构
[1] Fayetteville State Univ, Dept Math & Comp Sci, Fayetteville, NC 28301 USA
关键词
D O I
10.1109/MASS.2014.110
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A wireless sensor network (WSN) refers to a group of autonomous sensors capable of collecting environmental conditions such as temperature, humidity, and pressure. In addition, WSNs may be deployed in a risky region where sensor nodes are equipped to track suspicious targets and monitor harmful activities. In such scenarios, security is crucial and challenging. Such applications require top security, such as authentication, confidentiality, and integrity. In this paper, we focus on the authentication service in wireless senor network. Authentication is validity of entities and is considered the first line of defense against malicious attacks. With high security requirements, we assume sensor nodes are equipped with sufficient resources and are capable of performing advanced cryptographic operations. We propose a simple authentication protocol for wireless sensor networks based on distributed clustering and asymmetric cryptographic algorithms.
引用
收藏
页码:630 / 635
页数:6
相关论文
共 50 条
  • [41] A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks
    Das, Ashok Kumar
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    AD HOC & SENSOR WIRELESS NETWORKS, 2015, 28 (3-4) : 221 - 256
  • [42] Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
    Su, Tung-Shih
    Huang, Mei-Wen
    Li, Wei-Shou
    Hsieh, Wen-Shyong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [43] A Key Management Scheme Based on Hierarchical Wireless Sensor Networks
    Yu, Meisheng
    Miao, Yueqin
    Yu, Jing
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 42 - 49
  • [44] An Efficient Key Management Scheme in Hierarchical Wireless Sensor Networks
    Zhang, Xinyang
    Wang, Jidong
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [45] HIKES: Hierarchical key establishment scheme for wireless sensor networks
    Ibriq, J.
    Mahgoub, I.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1825 - 1856
  • [46] SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics
    Riaz, Rabia
    Gillani, Noor-ul-Ain
    Rizvi, SanamShahla
    Shokat, Sana
    Kwon, Se Jin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [47] A new and secure authentication scheme for wireless sensor networks with formal proof
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Peer-to-Peer Networking and Applications, 2017, 10 : 16 - 30
  • [48] Realizing a mutual authentication scheme base on telosb in wireless sensor networks
    Wang, Lie-Jun, 1600, Academic Journals Inc. (08):
  • [49] Cryptanalysis of a strong authentication scheme with user privacy for wireless sensor networks
    Xu, Chengbo
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON SENSORS, MECHATRONICS AND AUTOMATION (ICSMA 2016), 2016, 136 : 425 - 430
  • [50] Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
    Kim, Jun-Sub
    Kwak, Jin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,