{"title":"轻量级的基于身份的身份验证协议","authors":"Ying Li, Liping Du, Guifen Zhao, Jianwei Guo","doi":"10.1109/ICSPCC.2013.6664134","DOIUrl":null,"url":null,"abstract":"To ensure the Legality of access nodes in WSNs, a lightweight authentication protocol based on identity is proposed. In the protocol, key pools with node identity are prestored on both side of the authentication. By special authentication token generation algorithm and key pool, a onetime authentication code containing identity information is produced to confirm the identity of authenticated node in authentication process. The analysis shows that, compared with present authentication protocols, it has superiority in both security and efficiency.","PeriodicalId":124509,"journal":{"name":"2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013)","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A lightweight identity-based authentication protocol\",\"authors\":\"Ying Li, Liping Du, Guifen Zhao, Jianwei Guo\",\"doi\":\"10.1109/ICSPCC.2013.6664134\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To ensure the Legality of access nodes in WSNs, a lightweight authentication protocol based on identity is proposed. In the protocol, key pools with node identity are prestored on both side of the authentication. By special authentication token generation algorithm and key pool, a onetime authentication code containing identity information is produced to confirm the identity of authenticated node in authentication process. The analysis shows that, compared with present authentication protocols, it has superiority in both security and efficiency.\",\"PeriodicalId\":124509,\"journal\":{\"name\":\"2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013)\",\"volume\":\"2017 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSPCC.2013.6664134\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPCC.2013.6664134","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A lightweight identity-based authentication protocol
To ensure the Legality of access nodes in WSNs, a lightweight authentication protocol based on identity is proposed. In the protocol, key pools with node identity are prestored on both side of the authentication. By special authentication token generation algorithm and key pool, a onetime authentication code containing identity information is produced to confirm the identity of authenticated node in authentication process. The analysis shows that, compared with present authentication protocols, it has superiority in both security and efficiency.