期刊文献+

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks 被引量:8

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
原文传递
导出
摘要 Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture,we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs.The proposed approach reduces the computational load,since it performs only simple operations,such as exclusive-OR and a one-way hash function.This feature is more suitable for the resource-limited sensor nodes and mobile devices.And it is unnecessary for master nodes to forward login request messages to the base station,or maintain a long user list.In addition,pseudonym identity is introduced to preserve user anonymity.Through clever design,our proposed scheme can prevent smart card breaches.Finally,security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme. Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture,we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs.The proposed approach reduces the computational load,since it performs only simple operations,such as exclusive-OR and a one-way hash function.This feature is more suitable for the resource-limited sensor nodes and mobile devices.And it is unnecessary for master nodes to forward login request messages to the base station,or maintain a long user list.In addition,pseudonym identity is introduced to preserve user anonymity.Through clever design,our proposed scheme can prevent smart card breaches.Finally,security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.
出处 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第7期550-560,共11页 浙江大学学报C辑(计算机与电子(英文版)
关键词 User authentication User anonymity Smart card Two-tiered Wireless sensor network (WSN) User authentication User anonymity Smart card Two-tiered Wireless sensor network (WSN)
  • 相关文献

参考文献36

  • 1Awasthi, A., 2004. Comment on a dynamic ID-based remote user authentication scheme. Trans. Cryptol., 1(2):15-17. 被引量:1
  • 2Awasthi, A., Lal, S., 2004. An enhanced remote user au thentication scheme using smart cards. IEEE Trans. Consum. Electron., 50(2):583-586. [doi:10.1109/TCE. 2004.1309430]. 被引量:1
  • 3Benenson, Z., Gedicke, N., Raivio, O., 2005. Realizing Ro bust User Authentication in Sensor Networks. Proc. Workshop on Real-World Wireless Sensor Networks, p.1-5. 被引量:1
  • 4Chang, C.C., Wu, T.C., 1991. Remote password authenti cation with smart cards. IEE Proc. E Comput. Digit. Tech., 138(3):165-168. [doi:10.1049/ip-e.1991.O022]. 被引量:1
  • 5Das, M.L., 2009. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun., 8(3):1086-1090. [doi: 10.1109/TWC.2008.080128]. 被引量:1
  • 6Das, M.L., Saxena, A., Gulati, V.P., 2004. A dynamic ID based remote user authentication scheme. IEEE Trans. Consum. Electron., 50(2):629-631. [doi:10.1109/TCE. 2004.1309441]. 被引量:1
  • 7Desnoyers, P., Ganesan, D., Shenoy, P., 2005. TSAR: a Two Tier Sensor Storage Architecture Using Interval Skip Graphs. Proc. 3rd Int. Conf. on Embed ded Networked Sensor Systems, p.39-50. [doi:10.1145/ 1098918.1098923]. 被引量:1
  • 8Diao, Y., Ganesan, D., Mathur, G., Shenoy, P.J., 2007. Re thinking Data Management for Storage-Centric Sensor Networks. Proc. Conf. on Innovative Data Systems Research, p.22-31. 被引量:1
  • 9Dolev, D., Yao, A., 1983. On the security of public key protocols. IEEE Trans. Inform. Theory, 29(2):198-208. [doi: 10.1109/TIT. 1983.1056650]. 被引量:1
  • 10Du, W., Deng, J., Han, Y., Varshney, P., 2003. A Pairwise Key Predistribution Scheme for Wireless Sensor Net works. ACM Conf. on Computer and Communications Security, p.42-51. 被引量:1

同被引文献11

引证文献8

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部