Security Analysis of the Authentication Schemes Based on Wireless Sensor Networks
Authors
Binbin Yu, Liang Hu
Corresponding Author
Binbin Yu
Available Online March 2017.
- DOI
- 10.2991/amcce-17.2017.117How to use a DOI?
- Keywords
- Wireless sensor network; identity authentication; key agreement; attack.
- Abstract
As one of the basic technologies for building Internet of Things, wireless sensor networks (WSNs) are a hot research topic at present. In this paper, two basic structures of WSNs are described briefly, and the current security situation and security risks of WSNs are introduced. Then, this paper summarizes several mainstream ways of attacking identity authentication schemes that are applied to WSNs, including smart card theft, wireless sensor node capture, vampire attack and collusion attack, and presents some defensive measures. Finally, attacking principles of these attack methods are summarized, and some improvements are put forward.
- Copyright
- © 2017, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Binbin Yu AU - Liang Hu PY - 2017/03 DA - 2017/03 TI - Security Analysis of the Authentication Schemes Based on Wireless Sensor Networks BT - Proceedings of the 2017 2nd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2017) PB - Atlantis Press SP - 677 EP - 686 SN - 2352-5401 UR - https://doi.org/10.2991/amcce-17.2017.117 DO - 10.2991/amcce-17.2017.117 ID - Yu2017/03 ER -