An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

被引:0
|
作者
Rong FAN Daojing HE Xuezeng PANLingdi PING School of Computer Science and TechnologyZhejiang UniversityHangzhou China [310027 ]
机构
关键词
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN929.5 [移动通信];
学科分类号
摘要
Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture,we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs.The proposed approach reduces the computational load,since it performs only simple operations,such as exclusive-OR and a one-way hash function.This feature is more suitable for the resource-limited sensor nodes and mobile devices.And it is unnecessary for master nodes to forward login request messages to the base station,or maintain a long user list.In addition,pseudonym identity is introduced to preserve user anonymity.Through clever design,our proposed scheme can prevent smart card breaches.Finally,security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.
引用
收藏
页码:550 / 560
页数:11
相关论文
共 50 条
  • [21] SET: Secure and Efficient Top-k Query in Two-Tiered Wireless Sensor Networks
    Zhang, Xiaoying
    Peng, Hui
    Dong, Lei
    Chen, Hong
    Sun, Hui
    WEB AND BIG DATA, APWEB-WAIM 2017, PT I, 2017, 10366 : 495 - 510
  • [22] Serialized optimal relay schedules in two-tiered wireless sensor networks
    Pan, JP
    Hou, YT
    Cai, L
    Shi, Y
    Shen, SX
    COMPUTER COMMUNICATIONS, 2006, 29 (04) : 511 - 524
  • [23] Establishing pairwise keys in heterogeneous two-tiered wireless sensor networks
    Boujelben, Martel
    Cheikhrouhou, Omar
    Abid, Mohamed
    Youssef, Habib
    2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 442 - +
  • [24] Genetic algorithmic topology control for two-tiered wireless sensor networks
    Lee, Donghwan
    Lee, Wonjun
    Kim, Joongheon
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 4, PROCEEDINGS, 2007, 4490 : 385 - +
  • [25] ON IMPROVED RELAY NODES PLACEMENT IN TWO-TIERED WIRELESS SENSOR NETWORKS
    Zafar, Bilal
    Mir, Zeeshan Hameed
    Shams, S. M. Saif
    Ikram, Muhammad
    Baig, Waleed Akram
    Kim, Ki-Hyung
    Yoo, Seung-Wha
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1657 - +
  • [26] Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks
    Dai, Hua
    Wang, Min
    Yi, Xun
    Yang, Geng
    Bao, Jingjing
    IEEE ACCESS, 2017, 5 : 14478 - 14489
  • [27] Enhanced User Authentication Scheme for Wireless Sensor Networks
    Park, Hee-Joo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 367 - 374
  • [28] A dynamic User Authentication scheme for wireless sensor networks
    Wong, Kirk H. M.
    Zheng, Yuan
    Cao, Jiannong
    Wang, Shengwei
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 244 - +
  • [29] An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
    He, Daojing
    Gao, Yi
    Chan, Sammy
    Chen, Chun
    Bu, Jiajun
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (04) : 361 - 371
  • [30] Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Computational Complexity and Efficient Approximations
    Yang, Dejun
    Misra, Satyajayant
    Fang, Xi
    Xue, Guoliang
    Zhang, Junshan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (08) : 1399 - 1411