A Secure Authentication Scheme based on Brownian Motion in hierarchy Wireless Sensor Networks

被引:0
|
作者
Trong M.H. [1 ]
Van N.L. [1 ]
Tuan N.L. [1 ]
Dang H.H. [1 ]
机构
[1] Posts and Telecommunication Institute of Technology, Hanoi
关键词
authentication; Brownian motion; watermark technique; wireless sensor networks;
D O I
10.4108/eai.13-7-2018.160389
中图分类号
学科分类号
摘要
In the last few years, the Internet of Things (IoT) has experienced exponential advancements. In IoT infrastructures, Wireless Sensor Network (WSN) has been considered as one of the crucial technologies to support a lot of amazing services. To fulfill new requirements of deployed network environments, the security issue in wireless sensor networks has to be met new challenges such as secured and lightweight requirements simultaneously. Hence, in this paper, an authentication scheme based on the watermarking technique is proposed to secure the sensory data in hierarchy wireless sensor networks. Especially, natural movement characteristics of a sensor node are exploited to provide a conveniently watermarked data, that can be used to validate and detect data integrity attacks in familiar methods. The proposed authentication scheme is evaluated by numerical results and theoretically analyzed to prove a proposal efficiency. © 2019. Minh Hoang Trong et al., licensed to EAI. All Rights Reserved.
引用
收藏
页码:1 / 9
页数:8
相关论文
共 50 条
  • [1] A Secure Authentication and Data Sharing Scheme for Wireless Sensor Networks based on Blockchain
    Khan, Asad Ullah
    Javaid, Nadeem
    Ben Othman, Jalel
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [2] A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX
    Liu, Xin
    Guo, Zhenbin
    Ma, Jun
    Song, Yuchen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3533 - 3547
  • [3] A Secure Authentication and Key Management Scheme for Wireless Sensor Networks
    Khan, Sarmadullah
    Khan, Rafiullah
    SENSOR SYSTEMS AND SOFTWARE, 2015, 143 : 51 - 60
  • [4] Secure user authentication scheme for wireless healthcare sensor networks
    Liu, Chia-Hui
    Chung, Yu-Fang
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 250 - 261
  • [5] A Lightweight Mixed Secure Scheme based on the Watermarking Technique for Hierarchy Wireless Sensor Networks
    Trong-Minh Hoang
    Van-Hau Bui
    Nhu-Lan Vu
    Dang-Hai Hoang
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 649 - 653
  • [6] A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Lee, Youngsook
    Won, Dongho
    SENSORS, 2014, 14 (11): : 21023 - 21044
  • [7] A new and secure authentication scheme for wireless sensor networks with formal proof
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Peer-to-Peer Networking and Applications, 2017, 10 : 16 - 30
  • [8] Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
    Kim, Jun-Sub
    Kwak, Jin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [9] A new and secure authentication scheme for wireless sensor networks with formal proof
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 16 - 30
  • [10] An Authentication Protocol for Hierarchy-Based Wireless Sensor Networks
    Kim, KeeBum
    Zhang, YiYing
    Yang, WenCheng
    Park, MyongSoon
    23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 482 - 487