DocumentCode :
2890048
Title :
Analysis and extension of Benenson´s robust user authentication scheme
Author :
Bergsten, Wolfgang Meyer zu ; Mathar, Rudolf
Author_Institution :
Inst. for Theor. Inf. Technol., RWTH Aachen Univ., Aachen, Germany
fYear :
2010
fDate :
19-22 Sept. 2010
Firstpage :
897
Lastpage :
901
Abstract :
In [1], Benenson, Gedicke and Raivio propose a user authentication scheme for sensor networks. The scheme considers how to organize access control to a wireless sensor network for authorized users and rejection of unauthorized adversaries. In the first part of this paper we analyze and optimize the proposed authentication scheme. The second part deals with distribution of public keys to sensor nodes. Benenson´s protocol requires periodic distribution of a certification authority´s public key to sensor nodes. Considering wireless sensor network applications, these updates have to be accomplished over the air on a deployed network. We propose a wireless, online reconfiguration scheme implementing the key distribution.
Keywords :
authorisation; public key cryptography; telecommunication security; wireless sensor networks; Benenson protocol; Benenson robust user authentication scheme; access control; public keys; wireless sensor network; Authentication; Elliptic curve cryptography; Protocols; Wireless sensor networks; key distribution; robust authentication; security; wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communication Systems (ISWCS), 2010 7th International Symposium on
Conference_Location :
York
ISSN :
2154-0217
Print_ISBN :
978-1-4244-6315-2
Type :
conf
DOI :
10.1109/ISWCS.2010.5624305
Filename :
5624305
Link To Document :
بازگشت