Title :
Authentication schemes for wireless sensor networks
Author :
Tajeddine, Ayman ; Kayssi, Ayman ; Chehab, Ali ; Elhajj, I.
Author_Institution :
Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Beirut, Lebanon
Abstract :
In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor networks. We divide such techniques into three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. We discuss each category and deduce the best cipher for each, namely, RC5 and IBE-ECC to be applied in a WSN. We also specify the factors affecting the decision of which category is best to use and the different parameters affecting the network in each category. Finally, we give a real network example and discuss the appropriate choice of the authentication scheme based on the particular WSN needs.
Keywords :
public key cryptography; telecommunication security; wireless sensor networks; IBE-ECC; RC5; WSN; asymmetric cryptography; authentication scheme; cipher; hybrid techniques; wireless sensor network; Authentication; Ciphers; Elliptic curve cryptography; Encryption; Wireless sensor networks; Asymmetric Key; Authentication; Symmetric Key; Wireless Sensor Networks;
Conference_Titel :
Mediterranean Electrotechnical Conference (MELECON), 2014 17th IEEE
Conference_Location :
Beirut
DOI :
10.1109/MELCON.2014.6820562