2010 10th IEEE International Conference on Computer and Information Technology 2010
DOI: 10.1109/cit.2010.165
|View full text |Cite
|
Sign up to set email alerts
|

An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures

Abstract: In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploiting the limited resources of sensor nodes. Resource constraints of sensor nodes are hurdles in applying strong public key cryptographic based mechanisms in WSNs. To address the problem of authentication in WSNs, we propose an efficient and secure framework for authenticated broadcast/multicast by sensor nodes as well as for outside user authentic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(34 citation statements)
references
References 30 publications
0
34
0
Order By: Relevance
“…Resource restraint of sensor nodes are main trouble while applying strong public key cryptographic based mechanisms in WSNs. To deal with the problem of authentication in WSNs, in paper [6] they have proposed secure and efficient structure for authentic transmission by sensor nodes and for external user authentication, which uses identity based online/offline signature schemes. The main purpose of this structure are to allow all sensor nodes in the network, initially, to transmit an authenticated message speedily; secondly, to confirm the transmitted message sender and the message contents; and lastly, to confirm the authenticity of an external user.…”
Section: Figure 2: Time Line Showing Leach Operationmentioning
confidence: 99%
“…Resource restraint of sensor nodes are main trouble while applying strong public key cryptographic based mechanisms in WSNs. To deal with the problem of authentication in WSNs, in paper [6] they have proposed secure and efficient structure for authentic transmission by sensor nodes and for external user authentication, which uses identity based online/offline signature schemes. The main purpose of this structure are to allow all sensor nodes in the network, initially, to transmit an authenticated message speedily; secondly, to confirm the transmitted message sender and the message contents; and lastly, to confirm the authenticity of an external user.…”
Section: Figure 2: Time Line Showing Leach Operationmentioning
confidence: 99%
“…The authentication protocol decides how a node will authenticate in the network. Generally a system need to do four important functions such as user registration, user authentication, session key establishment and access control; to provide the access on data to the outsider users [1]. The user authentication ensures the only subscribe user can get access on the data.…”
Section: Introductionmentioning
confidence: 99%
“…User may authenticated by the base station, sensor nodes or both which is based on the protocol. Normally authentication can be done in two ways [1] centralized and distributed authentication. In centralized user authentication system, the users are authenticated by the base station.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To handle these two problems, we proposed an authentication framework for WSNs in [5] using Identity(ID)-based Cryptography [6] and Online/Offline Signature (OOS) [7] schemes. This framework is comprised of two authentication schemes: quick authenticated broadcast/multicast by sensor nodes and outside user authentication.…”
Section: Introductionmentioning
confidence: 99%