Efficient User and Broadcast Authentication Scheme for WSNs

被引:0
|
作者
Alabrah, Amerah [1 ,2 ]
Bassiouni, Mostafa [1 ]
机构
[1] Univ Cent Florida, Dept Elect Engn & Comp Sci, Orlando, FL 32816 USA
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
WSN; one-way hash chain; SHA-1; MOHC;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks are collections of tiny sensors working collaboratively to gather information. Two major shortcomings of today's WSNs are scarce energy and memory resources making it difficult to devise robust and effective security measures. Keyed-hash chains have been proposed as an efficient solution. Nevertheless, the basic configuration of one-way hash chains, where a shared key is hashed with no limits on the length of the chain causes an unwanted computational overhead and a potential security breach. In this paper, we propose a mini one-way hash chain protocol for user and broadcast authentication that is as effective, while at the same time significantly reducing the computational overhead. We avoid the potential security breach by using easily computed one time authentication tokens to secure communication. We also demonstrate that our protocol is energy preserving, light and efficient. Our simulation and evaluation tests reflect its benefit over straightforwardly configured one-way hash chains.
引用
收藏
页码:3052 / 3057
页数:6
相关论文
共 50 条
  • [41] An efficient and complete remote user authentication scheme using smart cards
    Liaw, Horng-Twu
    Lin, Jiann-Fu
    Wu, Wei-Chen
    MATHEMATICAL AND COMPUTER MODELLING, 2006, 44 (1-2) : 223 - 228
  • [42] A secure and efficient scheme of remote user authentication based on bilinear pairings
    Liao, Yi-Pin
    Wang, Shuenn-Shyang
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 920 - +
  • [43] Practical Broadcast Authentication Using Short-Lived Signatures in WSNs
    Lim, Chae Hoon
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 366 - 383
  • [44] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [45] An authentication scheme for locating compromised sensor nodes in WSNs
    Zhang, Youtao
    Yang, Jun
    Li, Weijia
    Wang, Linzhang
    Jin, Lingling
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 50 - 62
  • [46] εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    Shim, Kyung-Ah
    Lee, Young-Ran
    Park, Cheol-Min
    AD HOC NETWORKS, 2013, 11 (01) : 182 - 189
  • [47] A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs
    Kumar, Ravi
    Singh, Samayveer
    Singh, Pradeep Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [48] New efficient user authentication scheme with user anonymity facilitating e-commerce applications
    Chien, Hung-Yu
    9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 461 - 464
  • [49] Multi-user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography
    Kasyoka, Philemon
    Kimwele, Michael
    Angolo, Shem Mbandu
    ENGINEERING REPORTS, 2020, 2 (07)
  • [50] An anonymous and efficient remote biometrics user authentication scheme in a multi server environment
    Peng JIANG
    Qiaoyan WEN
    Wenmin LI
    Zhengping JIN
    Hua ZHANG
    Frontiers of Computer Science, 2015, 9 (01) : 142 - 156