{"title":"基于配对的传感器网络认证协议","authors":"Moises Salinas R., Gina Gallegos G., G. S.","doi":"10.1109/CONIELECOMP.2009.14","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks are a rapid grown technology trying to adopt several new applications. Such applications have brought new challenges to the table and in consequence there are services that became to be critical factors, just like authenticity in WSN. Node authenticity in WSN is a commodity service that allows verifying that the message source is a node belonging to the sensor network, providing a countermeasure against node impersonation and message’s injection. However, such service is considered too expensive when public key cryptography is involved. In this paper an authentication protocol for WSN is described with an estimation of costs on operations over the base field.","PeriodicalId":292855,"journal":{"name":"2009 International Conference on Electrical, Communications, and Computers","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Authentication Protocol for Sensor Networks Using Pairings\",\"authors\":\"Moises Salinas R., Gina Gallegos G., G. S.\",\"doi\":\"10.1109/CONIELECOMP.2009.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Sensor Networks are a rapid grown technology trying to adopt several new applications. Such applications have brought new challenges to the table and in consequence there are services that became to be critical factors, just like authenticity in WSN. Node authenticity in WSN is a commodity service that allows verifying that the message source is a node belonging to the sensor network, providing a countermeasure against node impersonation and message’s injection. However, such service is considered too expensive when public key cryptography is involved. In this paper an authentication protocol for WSN is described with an estimation of costs on operations over the base field.\",\"PeriodicalId\":292855,\"journal\":{\"name\":\"2009 International Conference on Electrical, Communications, and Computers\",\"volume\":\"133 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-02-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Electrical, Communications, and Computers\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONIELECOMP.2009.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Electrical, Communications, and Computers","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIELECOMP.2009.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Authentication Protocol for Sensor Networks Using Pairings
Wireless Sensor Networks are a rapid grown technology trying to adopt several new applications. Such applications have brought new challenges to the table and in consequence there are services that became to be critical factors, just like authenticity in WSN. Node authenticity in WSN is a commodity service that allows verifying that the message source is a node belonging to the sensor network, providing a countermeasure against node impersonation and message’s injection. However, such service is considered too expensive when public key cryptography is involved. In this paper an authentication protocol for WSN is described with an estimation of costs on operations over the base field.