A user authentication scheme based on identity-bits commitment for wireless sensor networks
Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference paper |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-30592 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-305922023-12-29T15:49:57Z A user authentication scheme based on identity-bits commitment for wireless sensor networks Jamil N. Sameon S.S. Mahmood R. 36682671900 36683226000 6506085008 Authentication Network protocols Sensor networks Authentication scheme Efficient authentication Entity authentications Key management Replay attack Secure localization Security analysis User authentication User authentication scheme Wireless sensor Wireless sensor networks Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment. � 2010 IEEE. Final 2023-12-29T07:49:57Z 2023-12-29T07:49:57Z 2010 Conference paper 10.1109/NETAPPS.2010.18 2-s2.0-78650370213 https://www.scopus.com/inward/record.uri?eid=2-s2.0-78650370213&doi=10.1109%2fNETAPPS.2010.18&partnerID=40&md5=ac4965b98527485577f7e82850d2855e https://irepository.uniten.edu.my/handle/123456789/30592 5635666 61 66 Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
topic |
Authentication Network protocols Sensor networks Authentication scheme Efficient authentication Entity authentications Key management Replay attack Secure localization Security analysis User authentication User authentication scheme Wireless sensor Wireless sensor networks |
spellingShingle |
Authentication Network protocols Sensor networks Authentication scheme Efficient authentication Entity authentications Key management Replay attack Secure localization Security analysis User authentication User authentication scheme Wireless sensor Wireless sensor networks Jamil N. Sameon S.S. Mahmood R. A user authentication scheme based on identity-bits commitment for wireless sensor networks |
description |
Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment. � 2010 IEEE. |
author2 |
36682671900 |
author_facet |
36682671900 Jamil N. Sameon S.S. Mahmood R. |
format |
Conference paper |
author |
Jamil N. Sameon S.S. Mahmood R. |
author_sort |
Jamil N. |
title |
A user authentication scheme based on identity-bits commitment for wireless sensor networks |
title_short |
A user authentication scheme based on identity-bits commitment for wireless sensor networks |
title_full |
A user authentication scheme based on identity-bits commitment for wireless sensor networks |
title_fullStr |
A user authentication scheme based on identity-bits commitment for wireless sensor networks |
title_full_unstemmed |
A user authentication scheme based on identity-bits commitment for wireless sensor networks |
title_sort |
user authentication scheme based on identity-bits commitment for wireless sensor networks |
publishDate |
2023 |
_version_ |
1806423506224676864 |
score |
13.214268 |