Chia Nan University of Pharmacy & Science Institutional Repository:Item 310902800/34069
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 18076/20274 (89%)
Visitors : 5248543      Online Users : 939
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://ir.cnu.edu.tw/handle/310902800/34069


    Title: An Authentication Information Exchange Scheme in WSN for IoT Applications
    Authors: Yang, Sheng-Kai
    Shiue, Ya-Ming
    Su, Zhi-Yuan
    Liu, I-Hsien
    Liu, Chuan-Gang
    Contributors: Chia Nan Univ Pharm & Sci, Dept Informat Management
    Chia Nan Univ Pharm & Sci, Dept Appl Informat & Multimedia
    Natl Cheng Kung Univ, Inst Comp & Commun Engn, Dept Elect Engn
    Keywords: Authentication protocol
    node captured attack
    IoT
    wireless sensor networks
    Date: 2020
    Issue Date: 2022-11-18 11:22:40 (UTC+8)
    Publisher: Ieee-Inst Electrical Electronics Engineers Inc
    Abstract: Recently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireless sensor nodes are usually deployed in easily touched places. Once this node captured attack occurs, wireless sensor network soon faces various security risks. In this paper, in order to resist node captured attack, we propose a novel authentication information exchange scheme in WSN, which is very different from the previous authentication researches. Our idea is to add an authentication information exchange scheme in previous authentication scheme but not propose new one. We develop this scheme based on the idea of the association scheme of Home GWN and local sensor nodes. In this study, HGWN should contact all local sensor nodes and meanwhile is responsible for performing an authentication information exchange scheme for resisting security risk. In order to prevent the attacker from guessing communication period between HGWN and the sensor, we also design a dynamic contacting mechanism. We give a detail discussion of this scheme and validate it by three ways, security evaluation, BAN logic and performance evaluation, which proves that our authentication information exchange scheme can achieve security features and goals.
    Relation: Ieee Access, v.8, pp.11
    Appears in Collections:[Dept. of Information Management] Periodical Articles
    [Dept. of Multimedia and Game Development] Periodical Articles

    Files in This Item:

    File Description SizeFormat
    10.1109_ACCESS.2020.2964815.pdf8350KbAdobe PDF219View/Open
    index.html0KbHTML693View/Open


    All items in CNU IR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback