{"title":"移动医疗传感器网络中基于节点信誉的自适应认证机制","authors":"Mihui Kim, K. Chae","doi":"10.1109/ICACT.2008.4493811","DOIUrl":null,"url":null,"abstract":"As the importance of sensor networks for the realization of ubiquitous world is recognized, the various aspects research for static sensor networks, that does not support the mobility of node, is underway. Medical sensor network (MSN) assuming the mobility of node takes notice as one of the highlight USN applications, but the research on the security issue for the environments is not enough even though the issue is the most important point for the successful deployment. Thus, in this paper we propose an adaptive authentication mechanism taking consideration in the tradeoff between processing speed and the degree of security strength. Using threshold secret sharing, our authentication gives the proper reputation to sensor nodes according to their behavior pattern. Thus if a sensor node has the best reputation and its sensing information is urgent, then the sink node processes the sensing information at first and performs post-authentication. Our analytical results show that our authentication provides the efficient to MSN even in the severe node traffic.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Adaptive Authentication Mechanism using Node Reputation on Mobile Medical Sensor Networks\",\"authors\":\"Mihui Kim, K. Chae\",\"doi\":\"10.1109/ICACT.2008.4493811\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the importance of sensor networks for the realization of ubiquitous world is recognized, the various aspects research for static sensor networks, that does not support the mobility of node, is underway. Medical sensor network (MSN) assuming the mobility of node takes notice as one of the highlight USN applications, but the research on the security issue for the environments is not enough even though the issue is the most important point for the successful deployment. Thus, in this paper we propose an adaptive authentication mechanism taking consideration in the tradeoff between processing speed and the degree of security strength. Using threshold secret sharing, our authentication gives the proper reputation to sensor nodes according to their behavior pattern. Thus if a sensor node has the best reputation and its sensing information is urgent, then the sink node processes the sensing information at first and performs post-authentication. Our analytical results show that our authentication provides the efficient to MSN even in the severe node traffic.\",\"PeriodicalId\":448615,\"journal\":{\"name\":\"2008 10th International Conference on Advanced Communication Technology\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 10th International Conference on Advanced Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACT.2008.4493811\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 10th International Conference on Advanced Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2008.4493811","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Adaptive Authentication Mechanism using Node Reputation on Mobile Medical Sensor Networks
As the importance of sensor networks for the realization of ubiquitous world is recognized, the various aspects research for static sensor networks, that does not support the mobility of node, is underway. Medical sensor network (MSN) assuming the mobility of node takes notice as one of the highlight USN applications, but the research on the security issue for the environments is not enough even though the issue is the most important point for the successful deployment. Thus, in this paper we propose an adaptive authentication mechanism taking consideration in the tradeoff between processing speed and the degree of security strength. Using threshold secret sharing, our authentication gives the proper reputation to sensor nodes according to their behavior pattern. Thus if a sensor node has the best reputation and its sensing information is urgent, then the sink node processes the sensing information at first and performs post-authentication. Our analytical results show that our authentication provides the efficient to MSN even in the severe node traffic.