期刊文献+

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks 被引量:8

原文传递
导出
摘要 Wireless sensor networks(WSNs)are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture,we propose an efficient and denial-of-service(DoS)-resistant user authentication scheme for two-tiered WSNs.The proposed approach reduces the computational load,since it performs only simple operations,such as exclusive-OR and a one-way hash function.This feature is more suitable for the resource-limited sensor nodes and mobile devices.And it is unnecessary for master nodes to forward login request messages to the base station,or maintain a long user list.In addition,pseudonym identity is introduced to preserve user anonymity.Through clever design,our proposed scheme can prevent smart card breaches.Finally,security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.
出处 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第7期550-560,共11页 浙江大学学报C辑(计算机与电子(英文版)
  • 相关文献

参考文献36

  • 1Awasthi, A., 2004. Comment on a dynamic ID-based remote user authentication scheme. Trans. Cryptol., 1(2):15-17.
  • 2Awasthi, A., Lal, S., 2004. An enhanced remote user au thentication scheme using smart cards. IEEE Trans. Consum. Electron., 50(2):583-586. [doi:10.1109/TCE. 2004.1309430].
  • 3Benenson, Z., Gedicke, N., Raivio, O., 2005. Realizing Ro bust User Authentication in Sensor Networks. Proc. Workshop on Real-World Wireless Sensor Networks, p.1-5.
  • 4Chang, C.C., Wu, T.C., 1991. Remote password authenti cation with smart cards. IEE Proc. E Comput. Digit. Tech., 138(3):165-168. [doi:10.1049/ip-e.1991.O022].
  • 5Das, M.L., 2009. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun., 8(3):1086-1090. [doi: 10.1109/TWC.2008.080128].
  • 6Das, M.L., Saxena, A., Gulati, V.P., 2004. A dynamic ID based remote user authentication scheme. IEEE Trans. Consum. Electron., 50(2):629-631. [doi:10.1109/TCE. 2004.1309441].
  • 7Desnoyers, P., Ganesan, D., Shenoy, P., 2005. TSAR: a Two Tier Sensor Storage Architecture Using Interval Skip Graphs. Proc. 3rd Int. Conf. on Embed ded Networked Sensor Systems, p.39-50. [doi:10.1145/ 1098918.1098923].
  • 8Diao, Y., Ganesan, D., Mathur, G., Shenoy, P.J., 2007. Re thinking Data Management for Storage-Centric Sensor Networks. Proc. Conf. on Innovative Data Systems Research, p.22-31.
  • 9Dolev, D., Yao, A., 1983. On the security of public key protocols. IEEE Trans. Inform. Theory, 29(2):198-208. [doi: 10.1109/TIT. 1983.1056650].
  • 10Du, W., Deng, J., Han, Y., Varshney, P., 2003. A Pairwise Key Predistribution Scheme for Wireless Sensor Net works. ACM Conf. on Computer and Communications Security, p.42-51.

同被引文献11

引证文献8

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部