Cargando…
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Molecular Diversity Preservation International (MDPI)
2011
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231356/ https://www.ncbi.nlm.nih.gov/pubmed/22163874 http://dx.doi.org/10.3390/s110504767 |
_version_ | 1782218203421736960 |
---|---|
author | Yeh, Hsiu-Lien Chen, Tien-Ho Liu, Pin-Chuan Kim, Tai-Hoo Wei, Hsin-Wen |
author_facet | Yeh, Hsiu-Lien Chen, Tien-Ho Liu, Pin-Chuan Kim, Tai-Hoo Wei, Hsin-Wen |
author_sort | Yeh, Hsiu-Lien |
collection | PubMed |
description | User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. |
format | Online Article Text |
id | pubmed-3231356 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2011 |
publisher | Molecular Diversity Preservation International (MDPI) |
record_format | MEDLINE/PubMed |
spelling | pubmed-32313562011-12-07 A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography Yeh, Hsiu-Lien Chen, Tien-Ho Liu, Pin-Chuan Kim, Tai-Hoo Wei, Hsin-Wen Sensors (Basel) Article User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. Molecular Diversity Preservation International (MDPI) 2011-05-02 /pmc/articles/PMC3231356/ /pubmed/22163874 http://dx.doi.org/10.3390/s110504767 Text en © 2011 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/). |
spellingShingle | Article Yeh, Hsiu-Lien Chen, Tien-Ho Liu, Pin-Chuan Kim, Tai-Hoo Wei, Hsin-Wen A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title | A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_full | A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_fullStr | A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_full_unstemmed | A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_short | A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_sort | secured authentication protocol for wireless sensor networks using elliptic curves cryptography |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231356/ https://www.ncbi.nlm.nih.gov/pubmed/22163874 http://dx.doi.org/10.3390/s110504767 |
work_keys_str_mv | AT yehhsiulien asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT chentienho asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT liupinchuan asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT kimtaihoo asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT weihsinwen asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT yehhsiulien securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT chentienho securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT liupinchuan securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT kimtaihoo securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT weihsinwen securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography |