• DocumentCode
    643960
  • Title

    An Id-based Multiple Authentication scheme against attacks in wireless sensor networks

  • Author

    Siwei Peng

  • Author_Institution
    Dept. of Comput. Sci., Beijing Univ. of Posts & Telecommun., Beijing, China
  • Volume
    03
  • fYear
    2012
  • fDate
    Oct. 30 2012-Nov. 1 2012
  • Firstpage
    1042
  • Lastpage
    1045
  • Abstract
    A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. Therefore, WSN is venerable to various attacks. Among these attacks, the id-based attack such as node replication attacks and Sybil attacks are the most threatening. Hence, the security in WSNs presents a critical challenge for identity and data authentication. Although there are some recent approaches, most are resources-costing or constrained to some specific systems. Thus, in this paper, we present a novel authentication scheme to prevent these attacks. This Id-based Multiple Authentication (IMA) scheme bases upon the joint identity authentication and steganography to present a secure mechanism for data aggregation in WSNs. Simulations against above-mentioned attacks applying this scheme is presented and consequently show that the scheme can successfully authenticate the sensory data with high confidentiality.
  • Keywords
    cryptographic protocols; wireless sensor networks; attacks; id-based multiple authentication scheme; monitoring tasks; resource-constrained sensor nodes; wireless sensor networks; Authentication; Communities; Computer crime; Peer-to-peer computing; Watermarking; Wireless sensor networks; Id-based authentication scheme; Security; Wireless sensor network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
  • Conference_Location
    Hangzhou
  • Print_ISBN
    978-1-4673-1855-6
  • Type

    conf

  • DOI
    10.1109/CCIS.2012.6664540
  • Filename
    6664540