{"title":"A lightweight identity-based authentication protocol","authors":"Ying Li, Liping Du, Guifen Zhao, Jianwei Guo","doi":"10.1109/ICSPCC.2013.6664134","DOIUrl":null,"url":null,"abstract":"To ensure the Legality of access nodes in WSNs, a lightweight authentication protocol based on identity is proposed. In the protocol, key pools with node identity are prestored on both side of the authentication. By special authentication token generation algorithm and key pool, a onetime authentication code containing identity information is produced to confirm the identity of authenticated node in authentication process. The analysis shows that, compared with present authentication protocols, it has superiority in both security and efficiency.","PeriodicalId":124509,"journal":{"name":"2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013)","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPCC.2013.6664134","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
To ensure the Legality of access nodes in WSNs, a lightweight authentication protocol based on identity is proposed. In the protocol, key pools with node identity are prestored on both side of the authentication. By special authentication token generation algorithm and key pool, a onetime authentication code containing identity information is produced to confirm the identity of authenticated node in authentication process. The analysis shows that, compared with present authentication protocols, it has superiority in both security and efficiency.