Security Solution for Real-Time Data Access in Wireless Sensor Networks

被引:0
|
作者
Luo, Hanguang [1 ]
Wen, Guangjun [1 ]
Su, Jian [2 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Nanjing, Jiangsu, Peoples R China
来源
关键词
Wireless Sensor Network; Authentication; Security; Lightweight; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; INTERNET;
D O I
10.1007/978-3-030-00021-9_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks (WSNs) have rapidly increased to be applicable in many different areas due to their wireless mobile connectivity, large scale deployment and ad hoc network. However, these characteristics make WSNs usually deployed in unattended and hostile field, which may bring some new threats such as information tampering and eavesdropping attacks, etc. User authentication is one of the most important security services that allowed the legitimate user to query and collect the real-time data from a sensor node in WSN. Since the sensor nodes are resource-constrained devices which have limited storage, power and computing resource, the proposed authentication scheme must be low cost and lightweight. Recently, Gope et al. proposed a realistic lightweight authentication for real-time data access in WSN. Unfortunately, through our analysis we identified several flaws exist in their scheme as well as exist in other two-factor schemes. In order to withstand these threats, in this paper, we proposed some solutions to withstand the problems in Gope et al.' s and other schemes. Our solutions provide an important reference for security data access in WSN.
引用
收藏
页码:37 / 48
页数:12
相关论文
共 50 条
  • [1] Industrial wireless sensor networks with real time data access
    Shanthi K.G.
    Sesha Vidhya S.
    Vishali G.
    Uma R.V.
    Thanuja M.
    Srinitha S.
    Materials Today: Proceedings, 2023, 80 : 2760 - 2764
  • [2] Lightweight three factor scheme for real-time data access in wireless sensor networks
    Hanguang Luo
    Guangjun Wen
    Jian Su
    Wireless Networks, 2020, 26 : 955 - 970
  • [3] Lightweight three factor scheme for real-time data access in wireless sensor networks
    Luo, Hanguang
    Wen, Guangjun
    Su, Jian
    WIRELESS NETWORKS, 2020, 26 (02) : 955 - 970
  • [4] On the Security of a Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
    Xiong, Ling
    Peng, Daiyuan
    Peng, Tu
    Liang, Hongbin
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 342 - 346
  • [5] New security approach in real-time wireless multimedia sensor networks
    Msolli, Amina
    Helali, Abdelhamid
    Maaref, Hassen
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 72 : 910 - 925
  • [6] Security enhancement for real-time routing protocol in wireless sensor networks
    Ali, A.
    Fisal, N.
    2008 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2008, : 75 - 79
  • [7] An Opportunistic Routing for Real-time Data in Wireless Sensor Networks
    Oh, Seungmin
    Yim, Yongbin
    Lee, Jeongcheol
    Park, Hosung
    Kim, Sang-Ha
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1157 - 1162
  • [8] Real-time data management on wireless sensor networks: A survey
    Diallo, Ousmane
    Rodrigues, Joel J. P. C.
    Sene, Mbaye
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1013 - 1021
  • [9] RELIABLE AND REAL-TIME DATA DISSEMINATION IN WIRELESS SENSOR NETWORKS
    Kim, Ki-Il
    Park, SangJoon
    Park, Hyeon
    Ham, Young Hwan
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 4059 - +
  • [10] Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network
    Sain, Mangal
    Chaudhray, Amlan Jyoti
    Aich, Satyabrata
    Lee, Hoon Jae
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 1135 - 1142