Security Authentication Scheme Research for Wireless Sensor Networks

Article Preview

Abstract:

Existing security authentication schemes are mostly concentrated on the key management and cryptographic algorithms. However, there are few authentication schemes designed according to the application needs. To solve this problem, considering the limited resource of wireless sensor networks and the practical application, a partially distributed authentication scheme is proposed. We use hierarchical network structure. Centralized authentication is used between the base station and cluster head nodes, while cluster head node and ordinary nodes use a distributed authentication. Analysis shows that this method has some advantages in the overhead of the storage, computing and communication, while network security can be guaranteed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1802-1805

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M.L. Das. Two-factor User Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communication, 2009, 8(3): 1086-1090.

DOI: 10.1109/twc.2008.080128

Google Scholar

[2] D.H. Nyang and M.K. Lee. Improvement of Das's Two-Factor Authentication Protocol in wireless sensor networks. IACR Cryptology ePrint Archive, 2009, 2009: 631.

Google Scholar

[3] M.S. Rosales, G.G. Garcia and G D Sanchez. Efficient message authentication protocol for WSN. Trans. On Computer, 2009, 8(6): 895-904.

Google Scholar

[4] X. Huang, H.B. Chen and G Yang. Identity-based authentication localization scheme for wireless sensor network. Journal on Communications, 2010, 31(3): 115-122. (in chinese).

Google Scholar

[5] D.M. Oscar, F.S. Amparo and M.S. Jose. A light-weight authentication scheme for wireless sensor networks. Ad-Hoc Networks, 2011, 9(5): 727-735.

DOI: 10.1016/j.adhoc.2010.08.020

Google Scholar

[6] Y.H. Hong, Y.H. Zeng and Y.J. Huang. Mutual Message Authentication Protocol in wireless Sensor Networks [C]/2012 International Conference on Intelligent Information and Networks(ICIIN) 2012, 23: 121-126.

Google Scholar

[7] H. Wang, W. Fang and X. Zhang, et al. Real-time Broadcast Authentication Algorithm for Wireless Sensor Networks. Journal of Computational Information Systems, 2013, 9(3): 1051-1059. (in chinese).

Google Scholar

[8] L. Mu, L.Y. Wang and Y.J. Zhang, et al. Security authentication protocol research for wireless sensor networks. Computer Engineering and Design, 2009, 30(23): 5279-5381. (in chinese).

Google Scholar