A robust user authentication scheme with self-certificates for wireless sensor networks

User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We p...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2011-08, Vol.4 (8), p.815-824
Hauptverfasser: Tseng, Huei-Ru, Jan, Rong-Hong, Yang, Wuu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 824
container_issue 8
container_start_page 815
container_title Security and communication networks
container_volume 4
creator Tseng, Huei-Ru
Jan, Rong-Hong
Yang, Wuu
description User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic‐curve cryptosystems with self‐certificates. The proposed scheme allows users to change their key pairs without interaction with a key distribution center (KDC). Moreover, the proposed scheme still works well even if the adversary captures tnodes out of nnodes in the WSNs. Security of the proposed scheme is modeled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend some of the most notorious attacks, including replay attacks, forgery attacks, and node‐capture attacks. Copyright © 2010 John Wiley & Sons, Ltd. The proposed robust user authentication scheme is based on elliptic‐curve cryptosystems with self‐certificates for wireless sensor networks. The proposed scheme allows users to change their key pairs without interaction with a key distribution center and still works well even if adversaries capture tnodes out of nnodes in the WSNs. Security of the scheme is modelled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend replay attacks, forgery attacks, and node‐capture attacks.
doi_str_mv 10.1002/sec.212
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1031309403</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1031309403</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3652-e89e8b85111fbdc3255b713eaf4293b7d58fc17898345d11b23c99a92a2ccdb83</originalsourceid><addsrcrecordid>eNp10E1PwkAQBuCN0URE41_oTRNT3I-W7h4REY1EQ8Rw3Gy301ApLe5sg_x7S2q4eZqZvE_m8BJyzeiAUcrvEeyAM35CekwJFVLG-elxZ9E5uUD8onTIoiTqkeUocHXaoA8aBBeYxq-g8oU1vqirAO0KNhDsCr8KEMo8tOB8kR9iwCCvXRs5KAGxjSts7wr8rnZrvCRnuSkRrv5mn3w-TRbj53D2Pn0Zj2ahFcOYhyAVyFTGjLE8zazgcZwmTIDJI65EmmSxzC1LpJIiijPGUi6sUkZxw63NUin65Lb7u3X1dwPo9aZAC2VpKqgb1IwKJqiKqGjpTUetqxEd5Hrrio1x-xbpQ3W6rU631bXyrpO7ooT9f0x_TMadDjtdoIefozZurYeJSGK9fJvqaP74Kh_oQs_FL1_lfxk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1031309403</pqid></control><display><type>article</type><title>A robust user authentication scheme with self-certificates for wireless sensor networks</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Tseng, Huei-Ru ; Jan, Rong-Hong ; Yang, Wuu</creator><creatorcontrib>Tseng, Huei-Ru ; Jan, Rong-Hong ; Yang, Wuu</creatorcontrib><description>User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic‐curve cryptosystems with self‐certificates. The proposed scheme allows users to change their key pairs without interaction with a key distribution center (KDC). Moreover, the proposed scheme still works well even if the adversary captures tnodes out of nnodes in the WSNs. Security of the proposed scheme is modeled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend some of the most notorious attacks, including replay attacks, forgery attacks, and node‐capture attacks. Copyright © 2010 John Wiley &amp; Sons, Ltd. The proposed robust user authentication scheme is based on elliptic‐curve cryptosystems with self‐certificates for wireless sensor networks. The proposed scheme allows users to change their key pairs without interaction with a key distribution center and still works well even if adversaries capture tnodes out of nnodes in the WSNs. Security of the scheme is modelled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend replay attacks, forgery attacks, and node‐capture attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>ISSN: 1939-0122</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.212</identifier><language>eng</language><publisher>Chichester, UK: John Wiley &amp; Sons, Ltd</publisher><subject>Authentication ; Communication networks ; Computer information security ; Computer simulation ; elliptic-curve cryptosystems ; Integrity ; Mathematical models ; Networks ; Petri nets ; self-certificates ; Sensors ; wireless sensor networks</subject><ispartof>Security and communication networks, 2011-08, Vol.4 (8), p.815-824</ispartof><rights>Copyright © 2010 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3652-e89e8b85111fbdc3255b713eaf4293b7d58fc17898345d11b23c99a92a2ccdb83</citedby><cites>FETCH-LOGICAL-c3652-e89e8b85111fbdc3255b713eaf4293b7d58fc17898345d11b23c99a92a2ccdb83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Tseng, Huei-Ru</creatorcontrib><creatorcontrib>Jan, Rong-Hong</creatorcontrib><creatorcontrib>Yang, Wuu</creatorcontrib><title>A robust user authentication scheme with self-certificates for wireless sensor networks</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic‐curve cryptosystems with self‐certificates. The proposed scheme allows users to change their key pairs without interaction with a key distribution center (KDC). Moreover, the proposed scheme still works well even if the adversary captures tnodes out of nnodes in the WSNs. Security of the proposed scheme is modeled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend some of the most notorious attacks, including replay attacks, forgery attacks, and node‐capture attacks. Copyright © 2010 John Wiley &amp; Sons, Ltd. The proposed robust user authentication scheme is based on elliptic‐curve cryptosystems with self‐certificates for wireless sensor networks. The proposed scheme allows users to change their key pairs without interaction with a key distribution center and still works well even if adversaries capture tnodes out of nnodes in the WSNs. Security of the scheme is modelled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend replay attacks, forgery attacks, and node‐capture attacks.</description><subject>Authentication</subject><subject>Communication networks</subject><subject>Computer information security</subject><subject>Computer simulation</subject><subject>elliptic-curve cryptosystems</subject><subject>Integrity</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Petri nets</subject><subject>self-certificates</subject><subject>Sensors</subject><subject>wireless sensor networks</subject><issn>1939-0114</issn><issn>1939-0122</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNp10E1PwkAQBuCN0URE41_oTRNT3I-W7h4REY1EQ8Rw3Gy301ApLe5sg_x7S2q4eZqZvE_m8BJyzeiAUcrvEeyAM35CekwJFVLG-elxZ9E5uUD8onTIoiTqkeUocHXaoA8aBBeYxq-g8oU1vqirAO0KNhDsCr8KEMo8tOB8kR9iwCCvXRs5KAGxjSts7wr8rnZrvCRnuSkRrv5mn3w-TRbj53D2Pn0Zj2ahFcOYhyAVyFTGjLE8zazgcZwmTIDJI65EmmSxzC1LpJIiijPGUi6sUkZxw63NUin65Lb7u3X1dwPo9aZAC2VpKqgb1IwKJqiKqGjpTUetqxEd5Hrrio1x-xbpQ3W6rU631bXyrpO7ooT9f0x_TMadDjtdoIefozZurYeJSGK9fJvqaP74Kh_oQs_FL1_lfxk</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Tseng, Huei-Ru</creator><creator>Jan, Rong-Hong</creator><creator>Yang, Wuu</creator><general>John Wiley &amp; Sons, Ltd</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201108</creationdate><title>A robust user authentication scheme with self-certificates for wireless sensor networks</title><author>Tseng, Huei-Ru ; Jan, Rong-Hong ; Yang, Wuu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3652-e89e8b85111fbdc3255b713eaf4293b7d58fc17898345d11b23c99a92a2ccdb83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Authentication</topic><topic>Communication networks</topic><topic>Computer information security</topic><topic>Computer simulation</topic><topic>elliptic-curve cryptosystems</topic><topic>Integrity</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Petri nets</topic><topic>self-certificates</topic><topic>Sensors</topic><topic>wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tseng, Huei-Ru</creatorcontrib><creatorcontrib>Jan, Rong-Hong</creatorcontrib><creatorcontrib>Yang, Wuu</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tseng, Huei-Ru</au><au>Jan, Rong-Hong</au><au>Yang, Wuu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A robust user authentication scheme with self-certificates for wireless sensor networks</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2011-08</date><risdate>2011</risdate><volume>4</volume><issue>8</issue><spage>815</spage><epage>824</epage><pages>815-824</pages><issn>1939-0114</issn><issn>1939-0122</issn><eissn>1939-0122</eissn><abstract>User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic‐curve cryptosystems with self‐certificates. The proposed scheme allows users to change their key pairs without interaction with a key distribution center (KDC). Moreover, the proposed scheme still works well even if the adversary captures tnodes out of nnodes in the WSNs. Security of the proposed scheme is modeled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend some of the most notorious attacks, including replay attacks, forgery attacks, and node‐capture attacks. Copyright © 2010 John Wiley &amp; Sons, Ltd. The proposed robust user authentication scheme is based on elliptic‐curve cryptosystems with self‐certificates for wireless sensor networks. The proposed scheme allows users to change their key pairs without interaction with a key distribution center and still works well even if adversaries capture tnodes out of nnodes in the WSNs. Security of the scheme is modelled and analyzed with Petri nets. Our analysis shows that the proposed scheme can successfully defend replay attacks, forgery attacks, and node‐capture attacks.</abstract><cop>Chichester, UK</cop><pub>John Wiley &amp; Sons, Ltd</pub><doi>10.1002/sec.212</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2011-08, Vol.4 (8), p.815-824
issn 1939-0114
1939-0122
1939-0122
language eng
recordid cdi_proquest_miscellaneous_1031309403
source EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Authentication
Communication networks
Computer information security
Computer simulation
elliptic-curve cryptosystems
Integrity
Mathematical models
Networks
Petri nets
self-certificates
Sensors
wireless sensor networks
title A robust user authentication scheme with self-certificates for wireless sensor networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T21%3A39%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20robust%20user%20authentication%20scheme%20with%20self-certificates%20for%20wireless%20sensor%20networks&rft.jtitle=Security%20and%20communication%20networks&rft.au=Tseng,%20Huei-Ru&rft.date=2011-08&rft.volume=4&rft.issue=8&rft.spage=815&rft.epage=824&rft.pages=815-824&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.212&rft_dat=%3Cproquest_cross%3E1031309403%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1031309403&rft_id=info:pmid/&rfr_iscdi=true