• DocumentCode
    143587
  • Title

    Authentication schemes for wireless sensor networks

  • Author

    Tajeddine, Ayman ; Kayssi, Ayman ; Chehab, Ali ; Elhajj, I.

  • Author_Institution
    Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Beirut, Lebanon
  • fYear
    2014
  • fDate
    13-16 April 2014
  • Firstpage
    367
  • Lastpage
    372
  • Abstract
    In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor networks. We divide such techniques into three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. We discuss each category and deduce the best cipher for each, namely, RC5 and IBE-ECC to be applied in a WSN. We also specify the factors affecting the decision of which category is best to use and the different parameters affecting the network in each category. Finally, we give a real network example and discuss the appropriate choice of the authentication scheme based on the particular WSN needs.
  • Keywords
    public key cryptography; telecommunication security; wireless sensor networks; IBE-ECC; RC5; WSN; asymmetric cryptography; authentication scheme; cipher; hybrid techniques; wireless sensor network; Authentication; Ciphers; Elliptic curve cryptography; Encryption; Wireless sensor networks; Asymmetric Key; Authentication; Symmetric Key; Wireless Sensor Networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mediterranean Electrotechnical Conference (MELECON), 2014 17th IEEE
  • Conference_Location
    Beirut
  • Type

    conf

  • DOI
    10.1109/MELCON.2014.6820562
  • Filename
    6820562