DocumentCode :
1669702
Title :
An ID-based user authentication scheme for Wireless Sensor Networks using ECC
Author :
Mnif, Amira ; Cheikhrouhou, Omar ; Jemaa, Maher Ben
Author_Institution :
Dept. of Comput. Sci. & Appl. Math., Tunisia Univ. of Sfax, Sfax, Tunisia
fYear :
2011
Firstpage :
1
Lastpage :
9
Abstract :
The explosive growth in the use of mobile and wireless devices demands a new generation of remote user authentication schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for transferred data in wireless networks. In this paper, we present a new method of access control adapted to constrained Wireless Sensor Networks (WSNs), that´s provide access to legitimate users and deny access to illegitimate ones. Our scheme is based on the ID-based techniques and the Elliptic Curve Cryptography (ECC). The proposed protocol provides mutual authentication and key establishment between the user and a gateway node in the WSN.
Keywords :
cryptographic protocols; public key cryptography; telecommunication security; wireless sensor networks; ECC; ID-based user authentication scheme; WSN; access control; elliptic curve cryptography; gateway node; key establishment; mobile devices; remote user authentication scheme; wireless devices; wireless sensor networks; Authentication; Computer architecture; Elliptic curves; Logic gates; Protocols; Wireless sensor networks; ECC; Identity-based; Public Key Cryptography (PKC); Two Tiered Architecture; User authentication; WSN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Microelectronics (ICM), 2011 International Conference on
Conference_Location :
Hammamet
Print_ISBN :
978-1-4577-2207-3
Type :
conf
DOI :
10.1109/ICM.2011.6177359
Filename :
6177359
Link To Document :
بازگشت