A user authentication scheme based on identity-bits commitment for wireless sensor networks

Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the...

Full description

Saved in:
Bibliographic Details
Main Authors: Jamil N., Sameon S.S., Mahmood R.
Other Authors: 36682671900
Format: Conference paper
Published: 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-30592
record_format dspace
spelling my.uniten.dspace-305922023-12-29T15:49:57Z A user authentication scheme based on identity-bits commitment for wireless sensor networks Jamil N. Sameon S.S. Mahmood R. 36682671900 36683226000 6506085008 Authentication Network protocols Sensor networks Authentication scheme Efficient authentication Entity authentications Key management Replay attack Secure localization Security analysis User authentication User authentication scheme Wireless sensor Wireless sensor networks Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment. � 2010 IEEE. Final 2023-12-29T07:49:57Z 2023-12-29T07:49:57Z 2010 Conference paper 10.1109/NETAPPS.2010.18 2-s2.0-78650370213 https://www.scopus.com/inward/record.uri?eid=2-s2.0-78650370213&doi=10.1109%2fNETAPPS.2010.18&partnerID=40&md5=ac4965b98527485577f7e82850d2855e https://irepository.uniten.edu.my/handle/123456789/30592 5635666 61 66 Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic Authentication
Network protocols
Sensor networks
Authentication scheme
Efficient authentication
Entity authentications
Key management
Replay attack
Secure localization
Security analysis
User authentication
User authentication scheme
Wireless sensor
Wireless sensor networks
spellingShingle Authentication
Network protocols
Sensor networks
Authentication scheme
Efficient authentication
Entity authentications
Key management
Replay attack
Secure localization
Security analysis
User authentication
User authentication scheme
Wireless sensor
Wireless sensor networks
Jamil N.
Sameon S.S.
Mahmood R.
A user authentication scheme based on identity-bits commitment for wireless sensor networks
description Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment. � 2010 IEEE.
author2 36682671900
author_facet 36682671900
Jamil N.
Sameon S.S.
Mahmood R.
format Conference paper
author Jamil N.
Sameon S.S.
Mahmood R.
author_sort Jamil N.
title A user authentication scheme based on identity-bits commitment for wireless sensor networks
title_short A user authentication scheme based on identity-bits commitment for wireless sensor networks
title_full A user authentication scheme based on identity-bits commitment for wireless sensor networks
title_fullStr A user authentication scheme based on identity-bits commitment for wireless sensor networks
title_full_unstemmed A user authentication scheme based on identity-bits commitment for wireless sensor networks
title_sort user authentication scheme based on identity-bits commitment for wireless sensor networks
publishDate 2023
_version_ 1806423506224676864
score 13.214268