BAS: The Biphase Authentication Scheme for Wireless Sensor Networks
The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcas...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2017-01, Vol.2017 (2017), p.1-10 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10 |
---|---|
container_issue | 2017 |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2017 |
creator | Yaqub, Nazish Rizvi, Sanam Shahla Chung, Tae Sun Riaz, Rabia |
description | The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks. |
doi_str_mv | 10.1155/2017/7041381 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455785454</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455785454</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-523294d03bb56fc587d090457840029a9b574e75fb6ebcbde9345b56e69959213</originalsourceid><addsrcrecordid>eNqF0MtLw0AQBvBFFKzVm2dZ8Kixs69s1ltbfEHRQyselzwmJLVN6m5K8b93S4oePc0M_PgGPkIuGdwxptSIA9MjDZKJhB2RATPCRMA4P_7dmTwlZ94vAWImtRyQ6WQ8v6eLCumk3lSpRzredhU2XZ2nXd02dJ5XuEZato5-1A5X6D2dY-PD_YrdrnWf_pyclOnK48VhDsn748Ni-hzN3p5epuNZlIsYukhxwY0sQGSZistcJboAA1LpRAJwk5pMaYlalVmMWZ4VaIRUgWJsjDKciSG57nM3rv3aou_sst26Jry0XKqQo6SSQd32Knet9w5Lu3H1OnXfloHd12T3NdlDTYHf9LyqmyLd1f_pq15jMFimf5qDgESKH3u4bms</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455785454</pqid></control><display><type>article</type><title>BAS: The Biphase Authentication Scheme for Wireless Sensor Networks</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Yaqub, Nazish ; Rizvi, Sanam Shahla ; Chung, Tae Sun ; Riaz, Rabia</creator><contributor>Li, Huaizhi</contributor><creatorcontrib>Yaqub, Nazish ; Rizvi, Sanam Shahla ; Chung, Tae Sun ; Riaz, Rabia ; Li, Huaizhi</creatorcontrib><description>The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2017/7041381</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Communication ; Denial of service attacks ; Energy ; Messages ; Nodes ; Security management ; Sensors ; Wireless networks ; Wireless sensor networks</subject><ispartof>Security and communication networks, 2017-01, Vol.2017 (2017), p.1-10</ispartof><rights>Copyright © 2017 Rabia Riaz et al.</rights><rights>Copyright © 2017 Rabia Riaz et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-523294d03bb56fc587d090457840029a9b574e75fb6ebcbde9345b56e69959213</citedby><cites>FETCH-LOGICAL-c360t-523294d03bb56fc587d090457840029a9b574e75fb6ebcbde9345b56e69959213</cites><orcidid>0000-0001-5992-1136 ; 0000-0003-4694-3250</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Li, Huaizhi</contributor><creatorcontrib>Yaqub, Nazish</creatorcontrib><creatorcontrib>Rizvi, Sanam Shahla</creatorcontrib><creatorcontrib>Chung, Tae Sun</creatorcontrib><creatorcontrib>Riaz, Rabia</creatorcontrib><title>BAS: The Biphase Authentication Scheme for Wireless Sensor Networks</title><title>Security and communication networks</title><description>The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.</description><subject>Communication</subject><subject>Denial of service attacks</subject><subject>Energy</subject><subject>Messages</subject><subject>Nodes</subject><subject>Security management</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNqF0MtLw0AQBvBFFKzVm2dZ8Kixs69s1ltbfEHRQyselzwmJLVN6m5K8b93S4oePc0M_PgGPkIuGdwxptSIA9MjDZKJhB2RATPCRMA4P_7dmTwlZ94vAWImtRyQ6WQ8v6eLCumk3lSpRzredhU2XZ2nXd02dJ5XuEZato5-1A5X6D2dY-PD_YrdrnWf_pyclOnK48VhDsn748Ni-hzN3p5epuNZlIsYukhxwY0sQGSZistcJboAA1LpRAJwk5pMaYlalVmMWZ4VaIRUgWJsjDKciSG57nM3rv3aou_sst26Jry0XKqQo6SSQd32Knet9w5Lu3H1OnXfloHd12T3NdlDTYHf9LyqmyLd1f_pq15jMFimf5qDgESKH3u4bms</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Yaqub, Nazish</creator><creator>Rizvi, Sanam Shahla</creator><creator>Chung, Tae Sun</creator><creator>Riaz, Rabia</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-5992-1136</orcidid><orcidid>https://orcid.org/0000-0003-4694-3250</orcidid></search><sort><creationdate>20170101</creationdate><title>BAS: The Biphase Authentication Scheme for Wireless Sensor Networks</title><author>Yaqub, Nazish ; Rizvi, Sanam Shahla ; Chung, Tae Sun ; Riaz, Rabia</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-523294d03bb56fc587d090457840029a9b574e75fb6ebcbde9345b56e69959213</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Communication</topic><topic>Denial of service attacks</topic><topic>Energy</topic><topic>Messages</topic><topic>Nodes</topic><topic>Security management</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yaqub, Nazish</creatorcontrib><creatorcontrib>Rizvi, Sanam Shahla</creatorcontrib><creatorcontrib>Chung, Tae Sun</creatorcontrib><creatorcontrib>Riaz, Rabia</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yaqub, Nazish</au><au>Rizvi, Sanam Shahla</au><au>Chung, Tae Sun</au><au>Riaz, Rabia</au><au>Li, Huaizhi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>BAS: The Biphase Authentication Scheme for Wireless Sensor Networks</atitle><jtitle>Security and communication networks</jtitle><date>2017-01-01</date><risdate>2017</risdate><volume>2017</volume><issue>2017</issue><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2017/7041381</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0001-5992-1136</orcidid><orcidid>https://orcid.org/0000-0003-4694-3250</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2017-01, Vol.2017 (2017), p.1-10 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2455785454 |
source | Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals |
subjects | Communication Denial of service attacks Energy Messages Nodes Security management Sensors Wireless networks Wireless sensor networks |
title | BAS: The Biphase Authentication Scheme for Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T01%3A20%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=BAS:%20The%20Biphase%20Authentication%20Scheme%20for%20Wireless%20Sensor%20Networks&rft.jtitle=Security%20and%20communication%20networks&rft.au=Yaqub,%20Nazish&rft.date=2017-01-01&rft.volume=2017&rft.issue=2017&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2017/7041381&rft_dat=%3Cproquest_cross%3E2455785454%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455785454&rft_id=info:pmid/&rfr_iscdi=true |