A Dynamic User Authentication Scheme for Wireless Sensor Networks
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
Efficient selection method of message authentication codes for filtering scheme in sensor networks
Proceedings of the 2nd international conference on Ubiquitous information management and communication
ACM Transactions on Sensor Networks (TOSN)
Simple Dynamic User Authentication Protocols for Wireless Sensor Networks
SENSORCOMM '08 Proceedings of the 2008 Second International Conference on Sensor Technologies and Applications
IEEE Communications Magazine
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In this work, we propose simple hash based message authentication and integrity code algorithm for wireless sensor networks. The proposed scheme uses pre-shared secret key which is obtained from Elliptic Curve Diffie Hellmann (ECDH) key exchange algorithm, and is based on modified SHA-1 (mSHA-1) hash function which helps to compute message authentication code for given messages. We suggest two scenarios depending on scale of the network, and also analyze security of the proposed algorithm. This algorithm provides both integrity and authenticity of a message with only one hash value.