4.4 Article

User authentication schemes with pseudonymity for ubiquitous sensor network in NGN

期刊

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
卷 23, 期 9-10, 页码 1201-1222

出版社

WILEY
DOI: 10.1002/dac.1097

关键词

wireless sensor network; user authentication; pseudonymity; next generation network

资金

  1. Ubiquitous Computing and Network(UCN), Ministry of Knowledge Economy (MKE) in Korea [UCN 09C1-T2-10M]

向作者/读者索取更多资源

Owing to the ubiquitous nature, ease of deployment, and wide range of potential applications, wireless sensor networks (WSNs) have received a lot of attention recently. WSNs can be deployed in unattended environments; however, they have many challenges. It should be guaranteed that not only illegitimate users cannot login and access data in the network but also user privacy should be maintained. Since sensor nodes have limited computation power, storage, and energy, it is desirable for the authentication protocol to be simple and secure. In this paper, we propose two user authentication protocols that are variations of a recent strong-password-based solution. It uses one-way hash functions and XOR operations to achieve lower computational and communication overheads. We have analyzed the performance of both the proposed authentication schemes in terms of various metrics. We have also provided security evaluation of the proposed protocols. Comparing with the previous schemes, our proposed schemes are more robust and provide better security. Copyright (C) 2009 John Wiley & Sons, Ltd.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据