Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2011, Vol. 12 Issue (7): 550-560    DOI: 10.1631/jzus.C1000377
    
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong FAN, Dao-jing HE*, Xue-zeng PAN, Ling-di PING
School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong FAN, Dao-jing HE*, Xue-zeng PAN, Ling-di PING
School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
 全文: PDF(307 KB)  
摘要: Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints. Considering that most large-scale WSNs follow a two-tiered architecture, we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs. The proposed approach reduces the computational load, since it performs only simple operations, such as exclusive-OR and a one-way hash function. This feature is more suitable for the resource-limited sensor nodes and mobile devices. And it is unnecessary for master nodes to forward login request messages to the base station, or maintain a long user list. In addition, pseudonym identity is introduced to preserve user anonymity. Through clever design, our proposed scheme can prevent smart card breaches. Finally, security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.
关键词: User authenticationUser anonymitySmart cardTwo-tieredWireless sensor network (WSN)    
Abstract: Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints. Considering that most large-scale WSNs follow a two-tiered architecture, we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs. The proposed approach reduces the computational load, since it performs only simple operations, such as exclusive-OR and a one-way hash function. This feature is more suitable for the resource-limited sensor nodes and mobile devices. And it is unnecessary for master nodes to forward login request messages to the base station, or maintain a long user list. In addition, pseudonym identity is introduced to preserve user anonymity. Through clever design, our proposed scheme can prevent smart card breaches. Finally, security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.
Key words: User authentication    User anonymity    Smart card    Two-tiered    Wireless sensor network (WSN)
收稿日期: 2010-10-27 出版日期: 2011-07-04
CLC:  TP393  
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Rong FAN
Dao-jing HE
Xue-zeng PAN
Ling-di PING

引用本文:

Rong FAN, Dao-jing HE, Xue-zeng PAN, Ling-di PING. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Front. Inform. Technol. Electron. Eng., 2011, 12(7): 550-560.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C1000377        http://www.zjujournals.com/xueshu/fitee/CN/Y2011/V12/I7/550

[1] Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou. Analysis and design of a smart card based authentication protocol[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(12): 909-917.
[2] Xiao-lei Ma, Yin-hai Wang, Feng Chen, Jian-feng Liu. Transit smart card data mining for passenger origin information extraction[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(10): 750-760.
[3] Wei-wei FANG, Ji-ming CHEN, Lei SHU, Tian-shu CHU, De-pei QIAN. Congestion avoidance, detection and alleviation in wireless sensor networks[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(1): 63-73.