Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
A Dynamic User Authentication Scheme for Wireless Sensor Networks
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Low-Cost elliptic curve cryptography for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks
IEEE Transactions on Wireless Communications
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Accountability and Q-Accountable Logging in Wireless Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In this paper, we propose a secure and scalable user authentication scheme for heterogeneous wireless sensor networks to prevent intrusions. Our scheme employs both public and secret key cryptography schemes, such that it takes advantages from both. Our analysis and simulation results show that our scheme is not only more secure and scalable than existing secret key cryptography-based schemes, but also requires less processing power and provides higher energy efficiency than existing public key cryptography-based schemes.