Vis enkel innførsel

dc.contributor.authorQuan, Zhou
dc.contributor.authorChumning, Tan
dc.contributor.authorChunming, Rong
dc.contributor.authorXianghan, Zhen
dc.date.accessioned2017-04-12T09:06:36Z
dc.date.available2017-04-12T09:06:36Z
dc.date.issued2015-04
dc.identifier.citationQuan, Z. et al. (2015) A secure user authentication protocol for sensor network in data capturing. Journal of Cloud Computing, 4(6),nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/2437505
dc.description.abstractSensor network is an important approach of data capturing. User authentication is a critical security issue for sensor networks because sensor nodes are deployed in an open and unattended environment, leaving them possible hostile attack. Some researchers proposed some user authentication protocols using one-way hash function or using biometric technology. Recently, Yel et al. and Wenbo et al. proposed a user authentication protocols using elliptic curves cryptography. However, there are some security weaknesses for these protocols. In the paper, we review several proposed user authentication protocols, with a detail review of the Wenbo et al.’s user authentication protocol and a cryptanalysis of this protocol that shows several security weaknesses. Furthermore, we propose a secure user authentication protocol using identity-based cryptography to overcome those weaknesses. Finally, we present the security analysis, a comparison of security, computation, and performance for the proposed protocols, which shows that this user authentication protocol is more secure and suitable for higher security WSNs.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringernb_NO
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjectdata capturingnb_NO
dc.subjectwireless sensor networksnb_NO
dc.subjectuser authenticationnb_NO
dc.subjectidentity-based cryptographynb_NO
dc.subjectdatasikkerhetnb_NO
dc.titleA secure user authentication protocol for sensor network in data capturingnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.rights.holder© 2015 Quan et al.; licensee Springer.nb_NO
dc.subject.nsiVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550nb_NO
dc.source.volume4nb_NO
dc.source.journalJournal of Cloud Computingnb_NO
dc.source.issue6nb_NO
dc.identifier.doi10.1186/s13677-015-0030-z


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal