DocumentCode
143587
Title
Authentication schemes for wireless sensor networks
Author
Tajeddine, Ayman ; Kayssi, Ayman ; Chehab, Ali ; Elhajj, I.
Author_Institution
Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Beirut, Lebanon
fYear
2014
fDate
13-16 April 2014
Firstpage
367
Lastpage
372
Abstract
In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor networks. We divide such techniques into three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. We discuss each category and deduce the best cipher for each, namely, RC5 and IBE-ECC to be applied in a WSN. We also specify the factors affecting the decision of which category is best to use and the different parameters affecting the network in each category. Finally, we give a real network example and discuss the appropriate choice of the authentication scheme based on the particular WSN needs.
Keywords
public key cryptography; telecommunication security; wireless sensor networks; IBE-ECC; RC5; WSN; asymmetric cryptography; authentication scheme; cipher; hybrid techniques; wireless sensor network; Authentication; Ciphers; Elliptic curve cryptography; Encryption; Wireless sensor networks; Asymmetric Key; Authentication; Symmetric Key; Wireless Sensor Networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Mediterranean Electrotechnical Conference (MELECON), 2014 17th IEEE
Conference_Location
Beirut
Type
conf
DOI
10.1109/MELCON.2014.6820562
Filename
6820562
Link To Document