Two-Factor User Authentication in Wireless Sensor Networks

被引:523
作者
Das, Manik Lal [1 ]
机构
[1] Dhirubhai Ambani Inst Informat & Commun Technol, Gandhinagar 382007, Gujarat, India
关键词
Authentication; sensor networks; wireless security; hash function; SECURITY;
D O I
10.1109/TWC.2008.080128
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
引用
收藏
页码:1086 / 1090
页数:5
相关论文
共 15 条
[1]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]  
[Anonymous], 2003, 802154 IEEE
[3]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[4]  
Benenson Z., 2004, P WORKSH SENS NETW L
[5]  
Bicakci K, 2005, LECT NOTES COMPUT SC, V3813, P80
[6]  
Callaway E.H., 2003, WIRELESS SENSOR NETW
[7]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[10]  
LAW YW, 2003, P INT C INF SEC SPEC