Survey on user authentication protocol in wireless sensor network
In wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. Howe...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-01-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00129 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530326510206976 |
---|---|
author | Wei-dong FANG Wu-xiong ZHANG Lian-hai SHAN Wei HE Wei CHEN |
author_facet | Wei-dong FANG Wu-xiong ZHANG Lian-hai SHAN Wei HE Wei CHEN |
author_sort | Wei-dong FANG |
collection | DOAJ |
description | In wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. However, since the sensor nodes have limited energy, communications and computing capacity, and they are usually deployed in hostile or unattended environment, the traditional user authentication protocol (UAP) is not entirely suitable for WSN. The security attacks were introduced for the UAP in WSN, its secure requirements and the theoretical foundation were given, and then the UAP's design processes were summarized. For the analysis of its security, the attack model was described, and the automated vali-dation of internet Security protocols and applications (AVISPA) and the high level protocols specification language (HLPSL) were overviewed in detail. Then, the current UAPs were reviewed in WSN, the future research directions were proposed. These researches will contribute to the design, analysis and optimization for the UAP in WSN. |
format | Article |
id | doaj-art-d757520bc3fb4c19b7d42be5ed14e0ae |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2017-01-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-d757520bc3fb4c19b7d42be5ed14e0ae2025-01-15T03:05:26ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-01-01311259549447Survey on user authentication protocol in wireless sensor networkWei-dong FANGWu-xiong ZHANGLian-hai SHANWei HEWei CHENIn wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. However, since the sensor nodes have limited energy, communications and computing capacity, and they are usually deployed in hostile or unattended environment, the traditional user authentication protocol (UAP) is not entirely suitable for WSN. The security attacks were introduced for the UAP in WSN, its secure requirements and the theoretical foundation were given, and then the UAP's design processes were summarized. For the analysis of its security, the attack model was described, and the automated vali-dation of internet Security protocols and applications (AVISPA) and the high level protocols specification language (HLPSL) were overviewed in detail. Then, the current UAPs were reviewed in WSN, the future research directions were proposed. These researches will contribute to the design, analysis and optimization for the UAP in WSN.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00129WSNsecurityuser authentication protocoltwo-factorsthree-factors |
spellingShingle | Wei-dong FANG Wu-xiong ZHANG Lian-hai SHAN Wei HE Wei CHEN Survey on user authentication protocol in wireless sensor network 网络与信息安全学报 WSN security user authentication protocol two-factors three-factors |
title | Survey on user authentication protocol in wireless sensor network |
title_full | Survey on user authentication protocol in wireless sensor network |
title_fullStr | Survey on user authentication protocol in wireless sensor network |
title_full_unstemmed | Survey on user authentication protocol in wireless sensor network |
title_short | Survey on user authentication protocol in wireless sensor network |
title_sort | survey on user authentication protocol in wireless sensor network |
topic | WSN security user authentication protocol two-factors three-factors |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00129 |
work_keys_str_mv | AT weidongfang surveyonuserauthenticationprotocolinwirelesssensornetwork AT wuxiongzhang surveyonuserauthenticationprotocolinwirelesssensornetwork AT lianhaishan surveyonuserauthenticationprotocolinwirelesssensornetwork AT weihe surveyonuserauthenticationprotocolinwirelesssensornetwork AT weichen surveyonuserauthenticationprotocolinwirelesssensornetwork |