User Authentication with Distributed Cluster Formation in Wireless Sensor Networks

被引:1
|
作者
Kim, Dong-Hoon [1 ]
Hong, Youn-Sik [2 ]
Lee, Ki Young [1 ]
机构
[1] Incheon Natl Univ, Dept Informat & Telecommun Engn, Inchon, South Korea
[2] Incheon Natl Univ, Dept Comp Sci & Engn, Incheon, South Korea
关键词
S/Key algorithm; 3-way chaining authentication; Wireless sensor networks; Cluster formation;
D O I
10.1007/978-94-017-8798-7_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is an important aspect of any system and its development has enhanced widespread adoption of WSNs. In a typical situation, user wants to access the data directly from a node instead of accessing at the gateway or at the backend of an application system. Therefore, it is necessary that such an access is allowed only to a registered user. We present a user authentication scheme with distributed cluster formation in WSNs. This scheme works as a ring structure and uses one-way communication. In our protocol, three distinct components, gateway, user, and node, can mutually authenticate each other. In addition, we use S/Key algorithm as one-time password for authentication. Our analysis shows that our proposed scheme is as robust as conventional 4-way authentication scheme, while the communication overhead is substantially decreased.
引用
收藏
页码:75 / 85
页数:11
相关论文
共 50 条
  • [1] Secure distributed cluster formation in wireless sensor networks
    Sun, Kun
    Peng, Pai
    Ning, Peng
    Wang, Cliff
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 131 - 140
  • [2] User Authentication for Hierarchical Wireless Sensor Networks
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    [J]. 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 203 - 208
  • [3] Distributed Node Authentication in Wireless Sensor Networks
    Zhang, Qiyuan
    Zhou, Xuehai
    Yang, Feng
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3361 - 3364
  • [4] Recommendation of Multimodal User Authentication for Wireless Sensor Networks
    Preetha, S.
    Sheela, S., V
    [J]. 2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, 2019, : 117 - 122
  • [5] Enhanced User Authentication Scheme for Wireless Sensor Networks
    Park, Hee-Joo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 367 - 374
  • [6] A dynamic User Authentication scheme for wireless sensor networks
    Wong, Kirk H. M.
    Zheng, Yuan
    Cao, Jiannong
    Wang, Shengwei
    [J]. IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 244 - +
  • [7] User authentication schemes for wireless sensor networks: A review
    Kumari, Saru
    Khan, Muhammad Khurram
    Atiquzzaman, Mohammed
    [J]. AD HOC NETWORKS, 2015, 27 : 159 - 194
  • [8] An improved user authentication protocol for wireless sensor networks
    Kaur, Damandeep
    Kumar, Devender
    Saini, Khushil Kumar
    Grover, Harmanpreet Singh
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10):
  • [9] Distributed Mechanism For Authentication of Nodes In Wireless Sensor Networks
    Badetia, Neha
    Hussain, Muzzammil
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 471 - 474
  • [10] A Distributed Energy-Efficient Cluster Formation Protocol for Wireless Sensor Networks
    Chamam, Ali
    Pierre, Samuel
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 504 - 508