{"title":"无线传感器网络的用户分散认证方案","authors":"Junchang Wang, X. Lin","doi":"10.1109/ICDH.2012.48","DOIUrl":null,"url":null,"abstract":"Sensor nodes in wireless sensor networks (WSNs) have constrained resources and are susceptible to various attacks. It is critical to design a secure and efficient user authentication protocol for WSNs. Considering that sensor nods have extraordinary number and asymmetric resources compared with the number of users waiting for authentication, we propose user dispersed authentication scheme based on two-tiered WSN. In the proposed scheme, relative-powerful master node confirms user identify firstly, sensor nodes then perform user authentication collaboratively. Our scheme can avoid forgery and replay attack effectively, and it still works well in spite of partial impaired sensor nods in WSN. Furthermore, sensor nodes save more energy for less computational load, and communication cost is thus deduced by decreasing information diffusion.","PeriodicalId":308799,"journal":{"name":"2012 Fourth International Conference on Digital Home","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"User Dispersed Authentication Scheme for Wireless Sensor Networks\",\"authors\":\"Junchang Wang, X. Lin\",\"doi\":\"10.1109/ICDH.2012.48\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Sensor nodes in wireless sensor networks (WSNs) have constrained resources and are susceptible to various attacks. It is critical to design a secure and efficient user authentication protocol for WSNs. Considering that sensor nods have extraordinary number and asymmetric resources compared with the number of users waiting for authentication, we propose user dispersed authentication scheme based on two-tiered WSN. In the proposed scheme, relative-powerful master node confirms user identify firstly, sensor nodes then perform user authentication collaboratively. Our scheme can avoid forgery and replay attack effectively, and it still works well in spite of partial impaired sensor nods in WSN. Furthermore, sensor nodes save more energy for less computational load, and communication cost is thus deduced by decreasing information diffusion.\",\"PeriodicalId\":308799,\"journal\":{\"name\":\"2012 Fourth International Conference on Digital Home\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Digital Home\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDH.2012.48\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Digital Home","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDH.2012.48","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
User Dispersed Authentication Scheme for Wireless Sensor Networks
Sensor nodes in wireless sensor networks (WSNs) have constrained resources and are susceptible to various attacks. It is critical to design a secure and efficient user authentication protocol for WSNs. Considering that sensor nods have extraordinary number and asymmetric resources compared with the number of users waiting for authentication, we propose user dispersed authentication scheme based on two-tiered WSN. In the proposed scheme, relative-powerful master node confirms user identify firstly, sensor nodes then perform user authentication collaboratively. Our scheme can avoid forgery and replay attack effectively, and it still works well in spite of partial impaired sensor nods in WSN. Furthermore, sensor nodes save more energy for less computational load, and communication cost is thus deduced by decreasing information diffusion.