机构地区:[1]Department of Software Engineering,Foundation University,Islamabad,44000,Pakistan [2]Centre Informatique,Universite Gamal Abdel Nasser de,Conakry,Guinea [3]Department of Software Engineering,Bahria University Islamabad Campus,Islamabad,Pakistan [4]GDC Ahmad Karak,Higher Education Department,Khyber Pakhtunkhwa,Pakistan [5]Department of Electrical and Computer Engineering,Dhofar University,Salalah,Oman [6]Department of Software,Sejong University,Seoul,05006,Korea
出 处:《Computers, Materials & Continua》2022年第4期1695-1712,共18页计算机、材料和连续体(英文)
基 金:This research was financially supported in part by the Ministry of Trade,Industry and Energy(MOTIE)and Korea Institute for Advancement of Technology(KIAT)through the International Cooperative R&D program.(Project No.P0016038);in part by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2021-2016-0-00312)supervised by the IITP(Institute for Information&communications Technology Planning&Evaluation).
摘 要:The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance.All such types of applications based on wireless mobile sensor network are generally using real time data,most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network.This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station.But this leads to a serious security breach and degrades the performance of any security protocol available in this domain.Most existing schemes for authentication and cluster key management for external users,exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster head.This increase communication cost and delay in such real time access information.To handle this critical issue in cluster wireless mobile sensor network,we propose a lightweight authentication and key management scheme using a fuzzy extractor.In this scheme,any external user can access data directly from the cluster head of any cluster without the involvement of the base station.The proposed scheme only uses the one-way hash functions and bitwise XOR operations,apart from the fuzzy extractor method for the user biometric verification at the login phase.The presented scheme supports scalability for an increasing number of nodes using polynomials.The proposed scheme increases the life-time of the network by decreasing the key pool size.
关 键 词:Fuzzy extractor user authentication key management cluster session key wireless mobile sensor network
分 类 号:TN918.4[电子电信—通信与信息系统] TP212.9[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...