Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,252 Hits in 4.4 sec

An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC

Rakesh Maharana, Pabitra Mohan Khilar
2013 International Journal of Computer Applications  
In this paper,animproved user authentication protocol based on Elliptic Curve Cryptography (ECC) has been introduced for hierarchical wireless sensor networks (HWSN).  ...  User authentication in case of wireless sensor network is a very critical task, as sensor nodes are deployed in unattached environment and are prone to possible hostile network attacks.  ...  Here a smart-card based user authentication scheme in hierarchical wireless sensor network using ECC is proposed.  ... 
doi:10.5120/11528-7352 fatcat:ezkg6wqx6zhmrayxsp54em6tte

Security Flaws of a Password Authentication Scheme for Hierarchical WSNs

Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chin-Wen Lee, Ping-Nan Chiu, Cheng-Yi Wu
2013 Journal of Advances in Computer Networks  
Recently, Das et al. proposed a dynamic password-based user authentication scheme with dynamic node addition for hierarchical wireless sensor networks (WSNs).  ...  They claimed that their scheme achieves better security as compared to those for other existing password-based user authentication approaches. However, we observe that Das et al.'  ...  Very recently, Das et al. proposed a dynamic password-based user authentication scheme with smart cards for hierarchical wireless sensor networks [18] .  ... 
doi:10.7763/jacn.2013.v1.25 fatcat:yc4ufj5bnfhklezozuelkos5pu

An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card

Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava
2016 International Journal of Network Security  
In 2012, Das et al. proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks and showed that their scheme is secure against all possible attacks.  ...  To overcome these drawbacks, we have proposed an efficient and robust user authentication scheme for hierarchical wireless sensor networks without tamper-proof smart card in this paper.  ...  [4] proposed a dynamic passwordbased user authentication scheme for hierarchical wireless sensor networks.  ... 
dblp:journals/ijnsec/MaitraAGS16 fatcat:3crrxxjfsbarhii5cpgampc7k4

An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks

M. Turkanovic, M. Holbl
2013 Elektronika ir Elektrotechnika  
Das et al. recently proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks, which provides high security and a simple authentication approach.  ...  Index Terms-Password-based, user authentication, smart card, wireless sensor networks.  ...  s scheme we propose an improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks.  ... 
doi:10.5755/j01.eee.19.6.2038 fatcat:csfvmo5gkffzpoufzkdiuw2k64

Improved User Authentication in Hierarchical Wireless Sensor Networks

Dong-Hoon Kim, Ki Young Lee
2023 Journal of Software Assessment and Valuation  
Wireless sensor networks (WSNs) serve various real-time applications, such as vehicular tracking and habitat monitoring.  ...  Given the resource limitations of sensor nodes, simple and energy-efficient user authentication is crucial.  ...  In this section, we describe the hierarchical wireless sensor network and our proposed user authentication scheme with cluster formation in more detail.  ... 
doi:10.29056/jsav.2023.12.14 fatcat:7dlgtrpa2fdshcj6mokaq5toty

Secure Multimodal Authentication Scheme for Wireless Sensor Networks

Preetha Shivanna, Sheela Samudrala Venkatesiah
2021 International Journal of Safety and Security Engineering  
In this study, a Multimodal Authentication Scheme for Wireless Sensor Networks (WSN-MAS) is proposed to authenticate legitimate users.  ...  There are several methods to substantiate authorization and authentication. User authentication is essential for authenticating user access control in WSNs.  ...  A novel user authentication method using biometric was proposed for wireless sensor networks.  ... 
doi:10.18280/ijsse.110605 fatcat:haobpcieang2thsk2ncrq2suxa

Enhanced User Authentication Scheme for Wireless Sensor Networks

Hee-Joo Park
2015 International Journal of Security and Its Applications  
To provide unlinkability for wireless sensor network, Jiang et al. proposed an efficient two factor user authentication scheme. The scheme provides some good aspects for wireless sensor network.  ...  Then, this paper proposes a new enhanced user authentication scheme over wireless sensor networks to solve the weaknesses in Jiang et al.'s scheme.  ...  The proposed user authentication scheme could be used as a security building block for the wireless sensor network security.  ... 
doi:10.14257/ijsia.2015.9.8.32 fatcat:kxzdptreundcbh525s4zuupupq

A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs).  ...  It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining.  ...  The resiliency of the security protocols under a dynamic environment is not assured. The author in [12] explored the lightweight security mechanisms for the industrial wireless sensor networks.  ... 
doi:10.35940/ijitee.i7205.079920 fatcat:ze7gjtaj4jgs5blai3zyozidqe

A Survey Of Access Control Schemes In Wireless Sensor Networks

Youssou Faye, Ibrahima Niang, Thomas Noel
2011 Zenodo  
Using the node density parameter, we also provide a comparison of these proposed access control algorithms based on the network topology which can be flat or hierarchical.  ...  Access control is a critical security service in Wire- less Sensor Networks (WSNs). To prevent malicious nodes from joining the sensor network, access control is required.  ...  [40] proposed a lightweight dynamic user authentication scheme for WSNs.  ... 
doi:10.5281/zenodo.1330653 fatcat:fvqi3njsi5fztdjeqo6ywnrsi4

An efficient authentication and key agreement scheme based on ECDH for wireless sensor network

Mostafa farhadi Moghadam, Mahdi Nikooghadam, Maytham Azhar Baqer Al Jabban, Mohammad Alishahi, Leili Mortazavi, Amirhossein Mohajerzadeh
2020 IEEE Access  
INDEX TERMS Authentication, wireless sensor networks, key agreement, ECDH, security, privacy.  ...  Due to the widespread use of wireless sensor networks, valuable information is exchanged between network entities such as sensors, gates, users, etc. in an unsafe channel, and the presence of important  ...  In 2012 to provide this feature a password-based user authentication scheme in hierarchical WSN proposed by Das et al. [23] . Next year, Xue et al.  ... 
doi:10.1109/access.2020.2987764 fatcat:q7nj5bw2pbgg3o6j4i6uqooll4

Security Analysis and Performance Evaluation of an Enhanced Two-Factor Authenticated Scheme

Divya Jyoti, Raman Kumar
2014 International Journal of Computer Applications  
available in the network as well as provide user anonymity.  ...  Various security attacks may cause unauthorized access, misuse, modification, or denial of a computer network and network accessible resources.  ...  In Maharana and Khilar's scheme [31] , a smart card based user authentication scheme based on elliptic curve cryptography for large scale hierarchical wireless sensor networks is presented.  ... 
doi:10.5120/17709-8718 fatcat:oeucoi5glzamhgnj3y7jbugytm

A novel and efficient user access control scheme for wireless body area sensor networks

Santanu Chatterjee, Ashok Kumar Das, Jamuna Kanta Sing
2014 Journal of King Saud University: Computer and Information Sciences  
This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password.  ...  Wireless body area networks (WBANs) can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered.  ...  Our contributions This paper proposes a new password and group-based user access control scheme in wireless body area networks for health care applications.  ... 
doi:10.1016/j.jksuci.2013.10.007 fatcat:ssj2mdcfcbb4xk3mji72qlgogu

A User-Based Authentication and DoS Mitigation Scheme for Wearable Wireless Body Sensor Networks [article]

Nombulelo Zulu, Deon P. Du Plessis, Topside E. Mathonsi, Tshimangadzo M. Tshilongamulenzhe
2023 arXiv   pre-print
This paper proposes a User-Based authentication scheme to mitigate DoS attacks in WBSNs.  ...  A five-phase User-Based authentication DoS mitigation scheme for WBSNs is designed by integrating Elliptic Curve Cryptography (ECC) with Rivest Cipher 4 (RC4) to ensure a strong authentication process  ...  ACKNOWLEDGMENT The authors would like to thank the Tshwane University of Technology for financial support.  ... 
arXiv:2303.14441v1 fatcat:se3kcut3tbhevgxqzziet5527u

A Unique Secure Multimodal Biometrics-Based User Authenticated Key Exchange Protocol for generic HIoT Networks

Savitha M
2020 International Journal of Emerging Trends in Engineering Research  
Multimodal Biometrics-based User Authenticated Key Exchange Protocol (SMBUAKEP).  ...  The Special sort of generic IoT network namely Hierarchical IoT Network (HIoTN) is one in which a client can legitimately get to the continuous information from the sensing nodes in a protected generic  ...  Figure 1 : 1 Figure 1 : Architecture Diagram for Secure Multimodal Biometrics-Based User Authenticated Key Exchange Protocol for generic HIoT networks Figure 2 : 2 Figure 2 : A hierarchical IoT-based  ... 
doi:10.30534/ijeter/2020/22852020 fatcat:ywpytzppzvcirb7qdx6iooxqju

Survey of Security Technologies on Wireless Sensor Networks

Qiuwei Yang, Xiaogang Zhu, Hongjuan Fu, Xiqiang Che
2015 Journal of Sensors  
to traditional networks, which makes wireless sensor networks face more security threats.  ...  Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields.  ...  [21] proposed based on ECC encryption secure user authentication protocols. In 2012, Peng [22] proposed a multiidentity-based authentication scheme and Hong et al.  ... 
doi:10.1155/2015/842392 fatcat:mewhks7ppbetpi6fjq4huzgrt4
« Previous Showing results 1 — 15 out of 1,252 results