A User Authentication Protocol Combined With Trust Model and ECC for Wireless Sensor Networks

被引:0
作者
Liu, Tao [1 ]
Huang, Gan [1 ]
Xu, Zheng [2 ,3 ]
机构
[1] Anhui Polytech Univ, Sch Comp & Informat, Wuhu 241000, Peoples R China
[2] Minist Publ Secur, Res Inst 3, Beijing 100084, Peoples R China
[3] Tsinghua Univ, Beijing 100084, Peoples R China
来源
2016 IEEE 15TH INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS & COGNITIVE COMPUTING (ICCI*CC) | 2016年
基金
中国国家自然科学基金;
关键词
wireless sensor networks (WSNs); user authentication; elliptic curves cryptography(ECC); trust model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As sensor nodes are usually installed in harsh environments and nobody attends them, the character means it's easy for the networks to be subjected to all kinds of attacks. Moreover, the networks have limited computer power, communication power and energies. Therefore, in the environment, a well-organized and lightweight user authentication is a vital issue when a user possesses right to use the data from sensor nodes. In this article, a new user authentication protocol using trust model and elliptic curve cryptography (ECC) for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model's ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols.
引用
收藏
页码:451 / 458
页数:8
相关论文
共 15 条
[1]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]  
[Anonymous], 2017, MULTIMED TOOLS APPL, DOI DOI 10.1007/s11042-015-2731-1
[3]  
[Anonymous], 2020, IEEE T CLOUD COMPUT, DOI DOI 10.1109/TCC.2016.2517638
[4]  
[Anonymous], INT J DISTRIBUTED SE
[5]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[6]   Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Choi, Younsung ;
Lee, Donghoon ;
Kim, Jiye ;
Jung, Jaewook ;
Nam, Junghyun ;
Won, Dongho .
SENSORS, 2014, 14 (06) :10081-10106
[7]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[8]   Ant colony optimization theory: A survey [J].
Dorigo, M ;
Blum, C .
THEORETICAL COMPUTER SCIENCE, 2005, 344 (2-3) :243-278
[9]   Providing trust in wireless sensor networks using a bio-inspired technique [J].
Gomez Marmol, Felix ;
Martinez Perez, Gregorio .
TELECOMMUNICATION SYSTEMS, 2011, 46 (02) :163-180
[10]   Building Association Link Network for Semantic Link on Web Resources [J].
Luo, Xiangfeng ;
Xu, Zheng ;
Yu, Jie ;
Chen, Xue .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2011, 8 (03) :482-494