DocumentCode :
143587
Title :
Authentication schemes for wireless sensor networks
Author :
Tajeddine, Ayman ; Kayssi, Ayman ; Chehab, Ali ; Elhajj, I.
Author_Institution :
Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Beirut, Lebanon
fYear :
2014
fDate :
13-16 April 2014
Firstpage :
367
Lastpage :
372
Abstract :
In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor networks. We divide such techniques into three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. We discuss each category and deduce the best cipher for each, namely, RC5 and IBE-ECC to be applied in a WSN. We also specify the factors affecting the decision of which category is best to use and the different parameters affecting the network in each category. Finally, we give a real network example and discuss the appropriate choice of the authentication scheme based on the particular WSN needs.
Keywords :
public key cryptography; telecommunication security; wireless sensor networks; IBE-ECC; RC5; WSN; asymmetric cryptography; authentication scheme; cipher; hybrid techniques; wireless sensor network; Authentication; Ciphers; Elliptic curve cryptography; Encryption; Wireless sensor networks; Asymmetric Key; Authentication; Symmetric Key; Wireless Sensor Networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mediterranean Electrotechnical Conference (MELECON), 2014 17th IEEE
Conference_Location :
Beirut
Type :
conf
DOI :
10.1109/MELCON.2014.6820562
Filename :
6820562
Link To Document :
بازگشت