On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

2014 ◽  
Vol 73 ◽  
pp. 41-57 ◽  
Author(s):  
Ding Wang ◽  
Ping Wang
Author(s):  
Shakera Shaikh ◽  
Veena Gulhane

A wireless sensor network(WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor node is communicated to the base station, which forwards the data to the end user. In wireless sensor network data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. This paper synthesizes existing user authentication schemes in wireless sensor networks and highlights the challenges in user authentication.


2014 ◽  
Vol 687-691 ◽  
pp. 1802-1805
Author(s):  
Yuan Chen ◽  
Qing Ye

Existing security authentication schemes are mostly concentrated on the key management and cryptographic algorithms. However, there are few authentication schemes designed according to the application needs. To solve this problem, considering the limited resource of wireless sensor networks and the practical application, a partially distributed authentication scheme is proposed. We use hierarchical network structure. Centralized authentication is used between the base station and cluster head nodes, while cluster head node and ordinary nodes use a distributed authentication. Analysis shows that this method has some advantages in the overhead of the storage, computing and communication, while network security can be guaranteed.


Sign in / Sign up

Export Citation Format

Share Document