Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Gope, Prosanta -
dc.contributor.author Lee, Jemin -
dc.contributor.author Quek, Tony Q. S. -
dc.date.available 2017-06-29T08:06:59Z -
dc.date.created 2017-04-10 -
dc.date.issued 2017-01-15 -
dc.identifier.issn 1530-437X -
dc.identifier.uri http://hdl.handle.net/20.500.11750/2047 -
dc.description.abstract Wireless sensor networks (WSNs) include spatially allotted autonomous instruments that employ sensors to check environmental or physical conditions. These autonomous instruments or nodes blend with routers or gateway to make several WSN-based real-Time applications. In many critical applications, an external user can directly access the real-Time data from sensor node. In this context, before offering access, the legitimacy of the user is required to be verified through a secure authentication scheme. Since, in WSN-based real-Time applications, the privacy of the user is greatly important, the authentication scheme for such environment should be anonymous. Till now, impressive efforts have been made in designing lightweight anonymous authentication protocol for WSN-based real-Time applications. However, most of such protocols are vulnerable to DoS attacks, which are occurred due to the loss of synchronization between the participants. Furthermore, to rebuilt synchronization between the participants, a protocol may need to compromise un-link-Ability property. Therefore, it can be argued that the problem of DoS attack has not been addressed properly in the existing literatures. In this paper, we present a way to deal with DoS attacks in designing lightweight anonymous authentication protocol for WSN-based real-Time applications without compromising any anonymity support. We argue that our proposed solution can easily be incorporated with the existing schemes to be resilient to DoS attacks. © 2001-2012 IEEE. -
dc.publisher Institute of Electrical and Electronics Engineers Inc. -
dc.title Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks -
dc.type Article -
dc.identifier.doi 10.1109/JSEN.2016.2628413 -
dc.identifier.scopusid 2-s2.0-85013339862 -
dc.identifier.bibliographicCitation IEEE Sensors Journal, v.17, no.2, pp.498 - 503 -
dc.subject.keywordAuthor Anonymity -
dc.subject.keywordAuthor authentication -
dc.subject.keywordAuthor DoS attack -
dc.subject.keywordAuthor WSN -
dc.subject.keywordPlus Anonymity -
dc.subject.keywordPlus Anonymous Authentication -
dc.subject.keywordPlus Authentication -
dc.subject.keywordPlus Authentication Scheme -
dc.subject.keywordPlus Autonomous Instruments -
dc.subject.keywordPlus Computer Crime -
dc.subject.keywordPlus Critical Applications -
dc.subject.keywordPlus Denial-of-Service Attack -
dc.subject.keywordPlus Dos Attack -
dc.subject.keywordPlus Gateways (Computer Networks) -
dc.subject.keywordPlus KEY AGREemENT -
dc.subject.keywordPlus MUTUAL AUTHENTICATION -
dc.subject.keywordPlus SCHemE -
dc.subject.keywordPlus SECURE -
dc.subject.keywordPlus Secure Authentications -
dc.subject.keywordPlus Sensor Nodes -
dc.subject.keywordPlus User Authentication Protocols -
dc.subject.keywordPlus Wireless Sensor Network (WSNS) -
dc.subject.keywordPlus Wireless Sensor Networks -
dc.subject.keywordPlus WSN -
dc.citation.endPage 503 -
dc.citation.number 2 -
dc.citation.startPage 498 -
dc.citation.title IEEE Sensors Journal -
dc.citation.volume 17 -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science ISC(Information Security and Communication) Lab 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE