Security

A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks

Free registration required

Executive Summary

The uses of wireless sensor networks have increased to be applicable in many different areas, such as military applications, ecology, and health applications. These applications often include the management of confidential information, making the issue of security one of the most important aspects to consider. In this paper, the authors describe and crypto-analyze previous works in user authentication to illustrate their vulnerabilities and security flaws. They then propose a robust user authentication scheme that solves the identified limitations. Additionally, they describe how the proposed protocol is more suitable for a secure sensor network implementation by analysis in terms of security and performance.

  • Format: PDF
  • Size: 591.5 KB