The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User authentication scheme for sensor networks is proposed. In proposed scheme, we employ polynomial share and the hash value with a secret key as the basic means of constructing node authentication procedure in order to avoids the need for public key cryptography and reduce shortage overhead. The proposed scheme not only can achieve authentication mutually between communication two parts and prevent...
We address the issue of node authenticity in large sensor networks. Only sensor nodes that are verified can be accepted by the network. In this paper, we propose distributed node authentication schemes which rely on public information and the majority rules. In the basic scheme, each node's neighbors stores its identity and location information. When node A needs to check the authenticity of node...
Establishment of pairwise keys in wireless sensor networks is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, due to the resource constraints on sensor nodes, establishing pairwise keys in wireless sensor networks is not a trivial task. For the existing key pre-distribution schemes, as the number of compromised nodes...
Authentication is necessary to not only data exchange processes but also network administrative tasks in wireless sensor networks. So far, only data authentication has drawn much attention from the research community. We propose an efficient distributed node authentication (DNA) scheme that utilizes geographic location and trust relationship among neighboring sensor nodes to authenticate the identity...
In 2006, Wong et al. proposed a dynamic user authentication scheme for WSNs that allows legitimate users to query and collect sensor readings from sensor nodes of the network. They presented analysis to show that their scheme is secure and efficient. Later, in 2007, Tseng et al. pointed out several weaknesses in Wong et al.??s scheme and proposed an improved scheme to overcome the weaknesses. However,...
Wireless sensor networks (WSNs) are wireless ad hoc networks of tiny sensor nodes increasingly deployed for multiple civilian and military applications, including patient monitoring, wildlife monitoring, battlefield surveillance, enemy tracking, etc. Like other computer networks, WSNs must be provided of security services such as key management, confidentiality, integrity and authentication. However,...
User authentication is a critical issue for wireless sensor networks which are deployed in unattended environments. It guarantees only legitimate users are allowed to login and access data. Since sensor nodes have limited computation power, storage, and energy, it is desirable for the authentication protocol to be simple and secure. We propose in this paper two simple user authentication protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.