An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

来源 :Journal of Zhejiang University-Science C(Computers & Electro | 被引量 : 0次 | 上传用户:ziguangguo
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture,we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs.The proposed approach reduces the computational load,since it performs only simple operations,such as exclusive-OR and a one-way hash function.This feature is more suitable for the resource-limited sensor nodes and mobile devices.And it is unnecessary for master nodes to forward login request messages to the base station,or maintain a long user list.In addition,pseudonym identity is introduced to preserve user anonymity.Through clever design,our proposed scheme can prevent smart card breaches.Finally,security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme. Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture, we propose an efficient and denial-of-service (DoS) -resistant user authentication scheme for two-tiered WSNs.The proposed approach reduces the computational load, since it performs only simple operations, such as exclusive-OR and one-way hash function. This feature is more suitable for the resource-limited sensor nodes and mobile devices .And it is unnecessary for master nodes to forward login request messages to the base station, or maintain a long user list. In addition, pseudonym identity is introduced to preserve user anonymity.Through clever design, our proposed scheme can prevent smart card breaches. Finally, security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.
其他文献
本文基于大量实验数据,分析了渗流对岩石应力、应变的影响,建立了岩石渗流失稳尖点突变模型及岩石渗流重正化群变换关系方程,讨论了岩石渗流形成过程的自组织临界特性.应用AN
推荐提名、组织考察、酝酿协商、讨论决定是选拔任用干部的基本程序和主要环节。提高干部选拔任用工作水平,预防和治理用人上的不正之风,必须紧紧围绕选拔任用干部的主要环节
该文在介绍矩阵摄动理论和迭代摄动法的基础之上,讨论了摄动法结合Padé逼近方法应用在结构拓扑修改的重分析中的作用.在该论文中,主要作了以下一些工作:1.提出了有限元系统
该文从能量耗散的角度出发,研究了轮胎稳态滚动的磨损问题.该文首先阐述了轮胎稳态滚动有限元分析的基本原理,对柔性大滑移接触的边界条件处理方法,进行了详细描述.利用已有
静力弹塑性分析方法作为一种建筑抗震性能评估方法已被引入我国《建筑抗震设计规范》(GB50011 2001)。为了不断提高该方法的准确性和适用性,国内外研究人员对其做了大量的研
为了研究在线弹性和弹塑性情况下二维构件的疲劳寿命问题,本文基于各向同性损伤力学——有限元——附加力法进行相关的数值分析.由于引用附加力法,在损伤演化过程中只需一次
该文采用了一种系统的降维分析方法:利用有限元方法建立了转子轴承系统的有限元模型,然后利用固定界面部件模态综合法显著地降低系统的维数.降维之后,采用有效的数值计算方法
面对党的不同工作对象,党务干部普遍地觉得自己难以说话。有的同志自嘲地说:“与新社会阶层说话,说不上去;与困难群众说话,说不下去;与年青人说话,说不进去;与老同志说话,给
冲击载荷给我们生产和生活带来了诸多挑战.由于冲击载荷其作用时间短,强度大,能够造成一些破坏.基于安全或者费用方面的考虑,对相关产品的研究和验收要借助模拟试验进行.冲击
该文主要通过人工神经网络(ANN)以及断裂力学的方法,分析了功能梯度材料(FGMs)的力学性能参数,并且进一步对含有裂纹的功能梯度材料的断裂力学参数进行了模拟.论文第一部分分