A robust user authentication scheme with self-certificates for wireless sensor networks
User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We p...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2011-08, Vol.4 (8), p.815-824 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 824 |
---|---|
container_issue | 8 |
container_start_page | 815 |
container_title | Security and communication networks |
container_volume | 4 |
creator | Tseng, Huei-Ru Jan, Rong-Hong Yang, Wuu |
description | User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic‐curve cryptosystems with self‐certificates. The proposed scheme allows users to change their key pairs without interaction with a key distribution center (KDC). Moreover, the proposed scheme still works well even if the adversary captures tnodes out of nnodes in the WSNs. Security of the proposed scheme is modeled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend some of the most notorious attacks, including replay attacks, forgery attacks, and node‐capture attacks. Copyright © 2010 John Wiley & Sons, Ltd.
The proposed robust user authentication scheme is based on elliptic‐curve cryptosystems with self‐certificates for wireless sensor networks. The proposed scheme allows users to change their key pairs without interaction with a key distribution center and still works well even if adversaries capture tnodes out of nnodes in the WSNs. Security of the scheme is modelled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend replay attacks, forgery attacks, and node‐capture attacks. |
doi_str_mv | 10.1002/sec.212 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1031309403</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1031309403</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3652-e89e8b85111fbdc3255b713eaf4293b7d58fc17898345d11b23c99a92a2ccdb83</originalsourceid><addsrcrecordid>eNp10E1PwkAQBuCN0URE41_oTRNT3I-W7h4REY1EQ8Rw3Gy301ApLe5sg_x7S2q4eZqZvE_m8BJyzeiAUcrvEeyAM35CekwJFVLG-elxZ9E5uUD8onTIoiTqkeUocHXaoA8aBBeYxq-g8oU1vqirAO0KNhDsCr8KEMo8tOB8kR9iwCCvXRs5KAGxjSts7wr8rnZrvCRnuSkRrv5mn3w-TRbj53D2Pn0Zj2ahFcOYhyAVyFTGjLE8zazgcZwmTIDJI65EmmSxzC1LpJIiijPGUi6sUkZxw63NUin65Lb7u3X1dwPo9aZAC2VpKqgb1IwKJqiKqGjpTUetqxEd5Hrrio1x-xbpQ3W6rU631bXyrpO7ooT9f0x_TMadDjtdoIefozZurYeJSGK9fJvqaP74Kh_oQs_FL1_lfxk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1031309403</pqid></control><display><type>article</type><title>A robust user authentication scheme with self-certificates for wireless sensor networks</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Tseng, Huei-Ru ; Jan, Rong-Hong ; Yang, Wuu</creator><creatorcontrib>Tseng, Huei-Ru ; Jan, Rong-Hong ; Yang, Wuu</creatorcontrib><description>User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic‐curve cryptosystems with self‐certificates. The proposed scheme allows users to change their key pairs without interaction with a key distribution center (KDC). Moreover, the proposed scheme still works well even if the adversary captures tnodes out of nnodes in the WSNs. Security of the proposed scheme is modeled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend some of the most notorious attacks, including replay attacks, forgery attacks, and node‐capture attacks. Copyright © 2010 John Wiley & Sons, Ltd.
The proposed robust user authentication scheme is based on elliptic‐curve cryptosystems with self‐certificates for wireless sensor networks. The proposed scheme allows users to change their key pairs without interaction with a key distribution center and still works well even if adversaries capture tnodes out of nnodes in the WSNs. Security of the scheme is modelled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend replay attacks, forgery attacks, and node‐capture attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>ISSN: 1939-0122</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.212</identifier><language>eng</language><publisher>Chichester, UK: John Wiley & Sons, Ltd</publisher><subject>Authentication ; Communication networks ; Computer information security ; Computer simulation ; elliptic-curve cryptosystems ; Integrity ; Mathematical models ; Networks ; Petri nets ; self-certificates ; Sensors ; wireless sensor networks</subject><ispartof>Security and communication networks, 2011-08, Vol.4 (8), p.815-824</ispartof><rights>Copyright © 2010 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3652-e89e8b85111fbdc3255b713eaf4293b7d58fc17898345d11b23c99a92a2ccdb83</citedby><cites>FETCH-LOGICAL-c3652-e89e8b85111fbdc3255b713eaf4293b7d58fc17898345d11b23c99a92a2ccdb83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Tseng, Huei-Ru</creatorcontrib><creatorcontrib>Jan, Rong-Hong</creatorcontrib><creatorcontrib>Yang, Wuu</creatorcontrib><title>A robust user authentication scheme with self-certificates for wireless sensor networks</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic‐curve cryptosystems with self‐certificates. The proposed scheme allows users to change their key pairs without interaction with a key distribution center (KDC). Moreover, the proposed scheme still works well even if the adversary captures tnodes out of nnodes in the WSNs. Security of the proposed scheme is modeled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend some of the most notorious attacks, including replay attacks, forgery attacks, and node‐capture attacks. Copyright © 2010 John Wiley & Sons, Ltd.
The proposed robust user authentication scheme is based on elliptic‐curve cryptosystems with self‐certificates for wireless sensor networks. The proposed scheme allows users to change their key pairs without interaction with a key distribution center and still works well even if adversaries capture tnodes out of nnodes in the WSNs. Security of the scheme is modelled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend replay attacks, forgery attacks, and node‐capture attacks.</description><subject>Authentication</subject><subject>Communication networks</subject><subject>Computer information security</subject><subject>Computer simulation</subject><subject>elliptic-curve cryptosystems</subject><subject>Integrity</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Petri nets</subject><subject>self-certificates</subject><subject>Sensors</subject><subject>wireless sensor networks</subject><issn>1939-0114</issn><issn>1939-0122</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNp10E1PwkAQBuCN0URE41_oTRNT3I-W7h4REY1EQ8Rw3Gy301ApLe5sg_x7S2q4eZqZvE_m8BJyzeiAUcrvEeyAM35CekwJFVLG-elxZ9E5uUD8onTIoiTqkeUocHXaoA8aBBeYxq-g8oU1vqirAO0KNhDsCr8KEMo8tOB8kR9iwCCvXRs5KAGxjSts7wr8rnZrvCRnuSkRrv5mn3w-TRbj53D2Pn0Zj2ahFcOYhyAVyFTGjLE8zazgcZwmTIDJI65EmmSxzC1LpJIiijPGUi6sUkZxw63NUin65Lb7u3X1dwPo9aZAC2VpKqgb1IwKJqiKqGjpTUetqxEd5Hrrio1x-xbpQ3W6rU631bXyrpO7ooT9f0x_TMadDjtdoIefozZurYeJSGK9fJvqaP74Kh_oQs_FL1_lfxk</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Tseng, Huei-Ru</creator><creator>Jan, Rong-Hong</creator><creator>Yang, Wuu</creator><general>John Wiley & Sons, Ltd</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201108</creationdate><title>A robust user authentication scheme with self-certificates for wireless sensor networks</title><author>Tseng, Huei-Ru ; Jan, Rong-Hong ; Yang, Wuu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3652-e89e8b85111fbdc3255b713eaf4293b7d58fc17898345d11b23c99a92a2ccdb83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Authentication</topic><topic>Communication networks</topic><topic>Computer information security</topic><topic>Computer simulation</topic><topic>elliptic-curve cryptosystems</topic><topic>Integrity</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Petri nets</topic><topic>self-certificates</topic><topic>Sensors</topic><topic>wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tseng, Huei-Ru</creatorcontrib><creatorcontrib>Jan, Rong-Hong</creatorcontrib><creatorcontrib>Yang, Wuu</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tseng, Huei-Ru</au><au>Jan, Rong-Hong</au><au>Yang, Wuu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A robust user authentication scheme with self-certificates for wireless sensor networks</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2011-08</date><risdate>2011</risdate><volume>4</volume><issue>8</issue><spage>815</spage><epage>824</epage><pages>815-824</pages><issn>1939-0114</issn><issn>1939-0122</issn><eissn>1939-0122</eissn><abstract>User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic‐curve cryptosystems with self‐certificates. The proposed scheme allows users to change their key pairs without interaction with a key distribution center (KDC). Moreover, the proposed scheme still works well even if the adversary captures tnodes out of nnodes in the WSNs. Security of the proposed scheme is modeled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend some of the most notorious attacks, including replay attacks, forgery attacks, and node‐capture attacks. Copyright © 2010 John Wiley & Sons, Ltd.
The proposed robust user authentication scheme is based on elliptic‐curve cryptosystems with self‐certificates for wireless sensor networks. The proposed scheme allows users to change their key pairs without interaction with a key distribution center and still works well even if adversaries capture tnodes out of nnodes in the WSNs. Security of the scheme is modelled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend replay attacks, forgery attacks, and node‐capture attacks.</abstract><cop>Chichester, UK</cop><pub>John Wiley & Sons, Ltd</pub><doi>10.1002/sec.212</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2011-08, Vol.4 (8), p.815-824 |
issn | 1939-0114 1939-0122 1939-0122 |
language | eng |
recordid | cdi_proquest_miscellaneous_1031309403 |
source | EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Authentication Communication networks Computer information security Computer simulation elliptic-curve cryptosystems Integrity Mathematical models Networks Petri nets self-certificates Sensors wireless sensor networks |
title | A robust user authentication scheme with self-certificates for wireless sensor networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T21%3A39%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20robust%20user%20authentication%20scheme%20with%20self-certificates%20for%20wireless%20sensor%20networks&rft.jtitle=Security%20and%20communication%20networks&rft.au=Tseng,%20Huei-Ru&rft.date=2011-08&rft.volume=4&rft.issue=8&rft.spage=815&rft.epage=824&rft.pages=815-824&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.212&rft_dat=%3Cproquest_cross%3E1031309403%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1031309403&rft_id=info:pmid/&rfr_iscdi=true |