Secured Public Key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks

As Wireless Sensor Networks (WSNs) are susceptible to attacks and sensor nodes have limited resources, designing a secure and efficient user authentication protocol for WSNs is a difficult task. Considering that most future large-scale WSNs follow a two-tiered architecture, the authors propose an efficient and Denial-of-Service resistant user authentication scheme for two-tiered WSNs, which imposes very light computational load and requires simple operations such as one-way hash function and exclusive-OR operations. In addition, there is a growing requirement for preserving user anonymity recently. Thus, they introduce pseudonym identity for each user which is concealed in login messages. And through clever design, their proposed scheme can prevent from smart card breach.

Provided by: International Journal of Computer Science and Network Security Topic: Mobility Date Added: Aug 2012 Format: PDF

Find By Topic