Defense against outside attacks in wireless sensor networks
Computer Communications
Robust dynamic user authentication scheme for wireless sensor networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Two-factor user authentication in wireless sensor networks
IEEE Transactions on Wireless Communications
Simple hash based message authentication scheme for wireless sensor networks
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Security analysis of 'two-factor user authentication in wireless sensor networks'
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
An efficient and lightweight user authentication scheme for wireless sensor networks
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
Journal of Medical Systems
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
International Journal of Security and Networks
Journal of Network and Computer Applications
Personal and Ubiquitous Computing
Hi-index | 0.00 |
In this paper, we consider User Authentication (UA) for wireless sensor networks. UA is a fundamental issue in designing dependable and secure systems. Imagine that a wireless sensor network is deployed in an intelligent building, a hospital, or even a university campus, to allow legitimate users to send queries and retrieve the respective result at any of the sensor nodes. Importantly, the system needs to provide a means of user authentication to verify if the user is valid. We propose a dynamic strong-password based solution to this access control problem and adapt it into a wireless sensor network environment. The proposed strong-password authentication approach imposes very light computational load and requires simple operations, such as one-way hash function and exclusive-OR operations. We present the design of the proposed scheme and discuss how to make use of the security features on MAC sublayer (Medium Access Control) based on the IEEE 802.15.4 specification. Analysis on security and communication costs is presented to evaluate the effectiveness of the proposed scheme.