Dynamic Message Puzzle as Pre-Authentication Scheme in Wireless Sensor Networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks

Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology chan...

متن کامل

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Due to the low-cost nature of sensor network nodes, we cannot generally assume the availability of a high-performance CPU and tamperresistant hardware. Firstly, we propose a reliable broadcast message authentication working under the above-mentioned circumstances. The proposed scheme, although based on symmetric cryptographic primitives, is secure against anyone who knew the message authenticat...

متن کامل

A Review on Implementation of Message Authentication Scheme for Elliptic Curve Cryptography in Wireless Sensor Networks

Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhe...

متن کامل

Exploring Message Authentication in Sensor Networks

This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and physical and virtual multipath authentication. While end-to-end authentication provides the highest and most general security level, it may be too costly or impractical to implement. On the other end of the security scale, hop-to-...

متن کامل

Enhanced User Authentication Scheme for Wireless Sensor Networks

To provide unlinkability for wireless sensor network, Jiang et al. proposed an efficient two factor user authentication scheme. The scheme provides some good aspects for wireless sensor network. However, this paper shows that Jiang et al.’s scheme has some security weaknesses and proposes an enhanced scheme to remove the weaknesses in Jiang et al.’s scheme. The proposed scheme does not use veri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Advanced Science, Engineering and Information Technology

سال: 2019

ISSN: 2460-6952,2088-5334

DOI: 10.18517/ijaseit.9.1.7582