版权说明 操作指南
首页 > 成果 > 详情

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Li, Jiping;Zhang, Yuanyuan;Shen, Lixiang;Cao, Jing;Xie, Wenwu;...
通讯作者:
Li, JP
作者机构:
[Shen, Lixiang; Zhang, Yuanyuan; Cao, Jing; Li, Jiping] Changzhou Inst Technol, Sch Comp Sci & Informat Engn, Changzhou 213032, Jiangsu, Peoples R China.
[Xie, Wenwu] Hunan Inst Sci & Technol, Dept Informat Sci & Engn, Yueyang 410006, Peoples R China.
[Yizheng] Jianghan Univ, Sch Artificial Intelligence, Wuhan 430056, Peoples R China.
[Liu, Shouyin] Cent China Normal Univ, Sch Phys Sci & Technol, Wuhan 430079, Peoples R China.
通讯机构:
[Li, JP ] C
Changzhou Inst Technol, Sch Comp Sci & Informat Engn, Changzhou 213032, Jiangsu, Peoples R China.
语种:
英文
关键词:
Authentication;Computation theory;Gateways (computer networks);Hash functions;Network security;Authentication scheme;AVISPA;Efficient authentication;Formal security;Mutual authentication;Random Model;Real-or-random model;Secure authentications;Session key;Session key negotiation;Sensor nodes
期刊:
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
ISSN:
1976-7277
年:
2024
卷:
18
期:
3
页码:
801-825
机构署名:
本校为其他机构
院系归属:
物理科学与技术学院
摘要:
For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or effici...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com