A robust user authentication scheme with self-certificates for wireless sensor networks

被引:2
作者
Tseng, Huei-Ru [1 ]
Jan, Rong-Hong [1 ]
Yang, Wuu [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 30010, Taiwan
关键词
authentication; wireless sensor networks; elliptic-curve cryptosystems; self-certificates; Petri nets; REMOTE AUTHENTICATION; EFFICIENT;
D O I
10.1002/sec.212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic-curve cryptosystems with self-certificates. The proposed scheme allows users to change their key pairs without interaction with a key distribution center (KDC). Moreover, the proposed scheme still works well even if the adversary captures t nodes out of n nodes in the WSNs. Security of the proposed scheme is modeled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend some of the most notorious attacks, including replay attacks, forgery attacks, and node-capture attacks. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:815 / 824
页数:10
相关论文
共 50 条
  • [41] Secure and efficient user authentication scheme for multi-gateway wireless sensor networks
    Srinivas, Jangirala
    Mukhopadhyay, Sourav
    Mishra, Dheerendra
    AD HOC NETWORKS, 2017, 54 : 147 - 169
  • [42] Recommendation of Multimodal User Authentication for Wireless Sensor Networks
    Preetha, S.
    Sheela, S., V
    2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, 2019, : 117 - 122
  • [43] User authentication schemes for wireless sensor networks: A review
    Kumari, Saru
    Khan, Muhammad Khurram
    Atiquzzaman, Mohammed
    AD HOC NETWORKS, 2015, 27 : 159 - 194
  • [44] An enhanced two-factor user authentication in wireless sensor networks
    Jian-Jun Yuan
    Telecommunication Systems, 2014, 55 : 105 - 113
  • [45] Security enhanced user authentication scheme for wireless sensor network
    Jannati, Hoda
    Falahati, Abolfazl
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 215 - 228
  • [46] Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment
    Jangirala, Srinivas
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 45 - 65
  • [47] An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks
    Mbarek, Bacem
    Meddeb, Aref
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017), 2017, 109 : 553 - 559
  • [48] An enhanced two-factor user authentication in wireless sensor networks
    Yuan, Jian-Jun
    TELECOMMUNICATION SYSTEMS, 2014, 55 (01) : 105 - 113
  • [49] A reversible watermarking authentication scheme for wireless sensor networks
    Shi, Xi
    Xiao, Di
    INFORMATION SCIENCES, 2013, 240 : 173 - 183
  • [50] Robust data authentication for unattended wireless sensor networks
    Dahshan, Mostafa H.
    TELECOMMUNICATION SYSTEMS, 2017, 66 (02) : 181 - 196