A user authentication scheme based on identity-bits commitment for wireless sensor networks

Norziana Jamil, Sera Syarmila Sameon, Ramlan Mahmood

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment.

Original languageEnglish
Title of host publicationProceedings - 2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010
Pages61-66
Number of pages6
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010 - Alor Setar, Malaysia
Duration: Sept 22 2010Sept 23 2010

Publication series

NameProceedings - 2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010

Conference

Conference2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010
Country/TerritoryMalaysia
CityAlor Setar
Period9/22/109/23/10

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'A user authentication scheme based on identity-bits commitment for wireless sensor networks'. Together they form a unique fingerprint.

Cite this