Title :
Analysis and extension of Benenson´s robust user authentication scheme
Author :
Bergsten, Wolfgang Meyer zu ; Mathar, Rudolf
Author_Institution :
Inst. for Theor. Inf. Technol., RWTH Aachen Univ., Aachen, Germany
Abstract :
In [1], Benenson, Gedicke and Raivio propose a user authentication scheme for sensor networks. The scheme considers how to organize access control to a wireless sensor network for authorized users and rejection of unauthorized adversaries. In the first part of this paper we analyze and optimize the proposed authentication scheme. The second part deals with distribution of public keys to sensor nodes. Benenson´s protocol requires periodic distribution of a certification authority´s public key to sensor nodes. Considering wireless sensor network applications, these updates have to be accomplished over the air on a deployed network. We propose a wireless, online reconfiguration scheme implementing the key distribution.
Keywords :
authorisation; public key cryptography; telecommunication security; wireless sensor networks; Benenson protocol; Benenson robust user authentication scheme; access control; public keys; wireless sensor network; Authentication; Elliptic curve cryptography; Protocols; Wireless sensor networks; key distribution; robust authentication; security; wireless sensor networks;
Conference_Titel :
Wireless Communication Systems (ISWCS), 2010 7th International Symposium on
Conference_Location :
York
Print_ISBN :
978-1-4244-6315-2
DOI :
10.1109/ISWCS.2010.5624305