2020
DOI: 10.1109/access.2020.2964815
|View full text |Cite
|
Sign up to set email alerts
|

An Authentication Information Exchange Scheme in WSN for IoT Applications

Abstract: Recently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireless sensor nodes are usually deployed in easily touched places. Once this node captured attack occurs, wireless sensor network soon faces various security risks. In this paper, in order to resist node captured attack,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 31 publications
0
22
0
Order By: Relevance
“…Typical IoT installations allow remote users to access data from sensor nodes in WSNs through the Internet. Researchers have been developing effective approaches for merging WSNs into IoT environments [2,[11][12][13][14][15][16]. Because of the resource constraints of sensor nodes, to design an efficient and secure authentication scheme for WSNs in IoT environments constitutes a nontrivial challenge.…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…Typical IoT installations allow remote users to access data from sensor nodes in WSNs through the Internet. Researchers have been developing effective approaches for merging WSNs into IoT environments [2,[11][12][13][14][15][16]. Because of the resource constraints of sensor nodes, to design an efficient and secure authentication scheme for WSNs in IoT environments constitutes a nontrivial challenge.…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…In this section, we present how the proposed scheme is more efficient than the existing schemes in terms of computation, communication, and storage cost, based on a performance analysis, an efficiency study, and a performance study. Note that to evaluate the performance of the proposed scheme, we selected nine recently published authentication schemes (i.e., [16][17][18][19][20][21][22][23][24][25]) that have focused on lightweight performance.…”
Section: Discussionmentioning
confidence: 99%
“…They claimed that their scheme is secure against reply attacks, password guessing attacks, DoS attacks, forward secrecy, insider attacks, and user anonymity attacks and has efficient and suitable IoT applications. Yang et al [23] proposed an authentication scheme for information exchange in a wireless sensor network (WSN) of IoT application. Their scheme provides security against replay attacks, embedded device impersonation attacks, and user anonymity attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In [11], authors propose an authentication mechanism to secure communication in WSNs for IoT systems. This mechanism allows a sensor node in an identity-based cryptography to send a message to an Internet host in a public key infrastructure.…”
Section: Related Workmentioning
confidence: 99%