Efficient User and Broadcast Authentication Scheme for WSNs

被引:0
|
作者
Alabrah, Amerah [1 ,2 ]
Bassiouni, Mostafa [1 ]
机构
[1] Univ Cent Florida, Dept Elect Engn & Comp Sci, Orlando, FL 32816 USA
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
WSN; one-way hash chain; SHA-1; MOHC;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks are collections of tiny sensors working collaboratively to gather information. Two major shortcomings of today's WSNs are scarce energy and memory resources making it difficult to devise robust and effective security measures. Keyed-hash chains have been proposed as an efficient solution. Nevertheless, the basic configuration of one-way hash chains, where a shared key is hashed with no limits on the length of the chain causes an unwanted computational overhead and a potential security breach. In this paper, we propose a mini one-way hash chain protocol for user and broadcast authentication that is as effective, while at the same time significantly reducing the computational overhead. We avoid the potential security breach by using easily computed one time authentication tokens to secure communication. We also demonstrate that our protocol is energy preserving, light and efficient. Our simulation and evaluation tests reflect its benefit over straightforwardly configured one-way hash chains.
引用
收藏
页码:3052 / 3057
页数:6
相关论文
共 50 条
  • [31] BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) : 1545 - 1554
  • [32] A Broadcast Authentication Scheme in IoT Environments
    Mbarek, Bacem
    Meddeb, Aref
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [33] An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages
    Yavuz, Attila Altay
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) : 1733 - 1742
  • [34] An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages
    Yang, Haomiao
    Kim, Hyunsung
    Li, Hongwei
    Yoon, Eunjun
    Wang, Xiaofen
    Ding, Xuefeng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (10): : 2544 - 2560
  • [35] An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Zhao, Jing
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (06): : 977 - 985
  • [36] A Multi-user DoS-containment Broadcast Authentication Scheme for Wireless Sensor Networks
    Gan, Xian
    Li, Qiaoliang
    2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 472 - 475
  • [37] Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
    Kim, Jun-Sub
    Kwak, Jin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [38] Improved efficient remote user authentication scheme using smart cards
    Lee, SW
    Kim, HS
    Yoo, KY
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 565 - 567
  • [39] An hyper elliptic curve based efficient signcryption scheme for user authentication
    Devarajan, Malathi
    Sasikaladevi, N.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (06) : 8487 - 8498
  • [40] An Efficient and Secure User Authentication Scheme with Anonymity in Global Mobility Networks
    Madhusudhan, R.
    Suvidha, K. S.
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 19 - 24