{"title":"一种基于配对的无线传感器网络用户认证密钥分发系统","authors":"Gun-Wook Choi, Imyeong Lee","doi":"10.1109/CAIPT.2017.8320722","DOIUrl":null,"url":null,"abstract":"Today, wireless sensor networks are widely used due to the emergence of the Internet of Things. These networks communicate in exposed environments and as such they are susceptible to easy interception by attackers. Additionally, by its very nature, the Wireless Sensor Network environment is limited in its capacity to handle potentially sensitive information due to light security system. Thus, this study has been designed to enable the facility of anonymous user authentication and session key distribution in the transmission of sensitive data more securely by means of communication pairing with sensors. It also provides user anonymity on the network so that the identity of the sender or recipient cannot be verified, and proposes a secure protocol against denial-of-service attacks and spoofing attacks.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A key distribution system for user authentication using pairing-based in a WSN\",\"authors\":\"Gun-Wook Choi, Imyeong Lee\",\"doi\":\"10.1109/CAIPT.2017.8320722\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, wireless sensor networks are widely used due to the emergence of the Internet of Things. These networks communicate in exposed environments and as such they are susceptible to easy interception by attackers. Additionally, by its very nature, the Wireless Sensor Network environment is limited in its capacity to handle potentially sensitive information due to light security system. Thus, this study has been designed to enable the facility of anonymous user authentication and session key distribution in the transmission of sensitive data more securely by means of communication pairing with sensors. It also provides user anonymity on the network so that the identity of the sender or recipient cannot be verified, and proposes a secure protocol against denial-of-service attacks and spoofing attacks.\",\"PeriodicalId\":351075,\"journal\":{\"name\":\"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CAIPT.2017.8320722\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIPT.2017.8320722","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A key distribution system for user authentication using pairing-based in a WSN
Today, wireless sensor networks are widely used due to the emergence of the Internet of Things. These networks communicate in exposed environments and as such they are susceptible to easy interception by attackers. Additionally, by its very nature, the Wireless Sensor Network environment is limited in its capacity to handle potentially sensitive information due to light security system. Thus, this study has been designed to enable the facility of anonymous user authentication and session key distribution in the transmission of sensitive data more securely by means of communication pairing with sensors. It also provides user anonymity on the network so that the identity of the sender or recipient cannot be verified, and proposes a secure protocol against denial-of-service attacks and spoofing attacks.