TY - GEN
T1 - A user authentication scheme based on identity-bits commitment for wireless sensor networks
AU - Jamil, Norziana
AU - Sameon, Sera Syarmila
AU - Mahmood, Ramlan
PY - 2010
Y1 - 2010
N2 - Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment.
AB - Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment.
UR - http://www.scopus.com/inward/record.url?scp=78650370213&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650370213&partnerID=8YFLogxK
U2 - 10.1109/NETAPPS.2010.18
DO - 10.1109/NETAPPS.2010.18
M3 - Conference contribution
AN - SCOPUS:78650370213
SN - 9780769541778
T3 - Proceedings - 2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010
SP - 61
EP - 66
BT - Proceedings - 2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010
T2 - 2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010
Y2 - 22 September 2010 through 23 September 2010
ER -