Authentication schemes for wireless sensor networks

Ayman Tajeddine, A. Kayssi, A. Chehab, I. Elhajj
{"title":"Authentication schemes for wireless sensor networks","authors":"Ayman Tajeddine, A. Kayssi, A. Chehab, I. Elhajj","doi":"10.1109/MELCON.2014.6820562","DOIUrl":null,"url":null,"abstract":"In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor networks. We divide such techniques into three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. We discuss each category and deduce the best cipher for each, namely, RC5 and IBE-ECC to be applied in a WSN. We also specify the factors affecting the decision of which category is best to use and the different parameters affecting the network in each category. Finally, we give a real network example and discuss the appropriate choice of the authentication scheme based on the particular WSN needs.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"C-33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MELCON.2014.6820562","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor networks. We divide such techniques into three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. We discuss each category and deduce the best cipher for each, namely, RC5 and IBE-ECC to be applied in a WSN. We also specify the factors affecting the decision of which category is best to use and the different parameters affecting the network in each category. Finally, we give a real network example and discuss the appropriate choice of the authentication scheme based on the particular WSN needs.
无线传感器网络的认证方案
在本文中,我们讨论了适用于无线传感器网络中严重约束节点的不同认证技术。我们将这些技术分为三大类:基于对称密码术、非对称密码术和使用这两种密码方法的混合技术。我们讨论了每个类别,并推导出每个类别的最佳密码,即RC5和IBE-ECC用于WSN。我们还指定了影响哪种类别最好使用的决定的因素以及影响每个类别的网络的不同参数。最后,给出了一个真实的网络实例,并根据具体的WSN需求讨论了认证方案的选择。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信