Authentication Protocol Design and Low-Cost Key Encryption Function Implementation for Wireless Sensor Networks

被引:4
|
作者
Chu, Shao-I [1 ]
Huang, Yu-Jung [2 ]
Lin, Wei-Cheng [2 ]
机构
[1] Natl Kaohsiung Univ Appl Sci, Dept Elect Engn, Kaohsiung 80778, Taiwan
[2] I Shou Univ, Dept Elect Engn, Kaohsiung 84008, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 04期
关键词
Authentication protocol; security; wireless sensor network (WSN); 2-FACTOR USER AUTHENTICATION; SCHEME;
D O I
10.1109/JSYST.2015.2487508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have been widely used, most notably in real-time traffic monitoring and military sensing and tracking. However, WSN applications could suffer from threats and endanger the applications if the suitable security issues are not taken into consideration. As a result, user authentication is an important concern to protect data access from unauthorized users. This paper presents a lightweight mutual authentication protocol for WSN applications. Instead of traditionally using a hash function for data protection, one of the interesting aspects of this protocol is that, for the purpose of data protection but with a low computational cost, the proposed key encryption function only requires simple exclusive-OR (XOR) arithmetic operations. Moreover, the corresponding hardware architecture was implemented by using an Altera DE2 board, including an Altera Cyclone II field-programmable gate array (FPGA). Finally, the output waveforms from the FPGA were displayed on the 16702A logic analysis system for real-time verification.
引用
收藏
页码:2718 / 2725
页数:8
相关论文
共 50 条
  • [1] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Mir, Omid
    Munilla, Jorge
    Kumari, Saru
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 79 - 91
  • [2] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895
  • [3] Simulation and Evaluation of the Authentication and Session-Key Establishement Protocol in Wireless Sensor Networks
    Kim, Hyun Ho
    Bruce, Ndibanje
    Sain, Mangal
    Park, SuHyun
    Lee, HoonJae
    2015 IEEE CONFERENCE ON WIRELESS SENSORS (ICWISE), 2015, : 7 - 11
  • [4] Efficient Security Authentication Protocol in Wireless Sensor Networks
    Latha, S. Asha
    Sivabalan, A.
    ADVANCEMENTS IN AUTOMATION AND CONTROL TECHNOLOGIES, 2014, 573 : 418 - +
  • [5] A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
    Mo, Jiaqing
    Chen, Hang
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [6] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Omid Mir
    Jorge Munilla
    Saru Kumari
    Peer-to-Peer Networking and Applications, 2017, 10 : 79 - 91
  • [7] The Design of a Secure Three Factor Authentication Protocol for Wireless Sensor Networks
    Babu, Naresh M.
    Chakravarthy, A. S. N.
    Ravindranath, C.
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 184 - 190
  • [8] Low-cost group rekeying for unattended wireless sensor networks
    Hernandez-Serrano, Juan
    Vera-del-Campo, Juan
    Pegueroles, Josep
    Ganan, Carlos
    WIRELESS NETWORKS, 2013, 19 (01) : 47 - 67
  • [9] Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks
    Das, Ashok Kumar
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 1 - 9
  • [10] Low-cost group rekeying for unattended wireless sensor networks
    Juan Hernández-Serrano
    Juan Vera-del-Campo
    Josep Pegueroles
    Carlos Gañán
    Wireless Networks, 2013, 19 : 47 - 67