Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016)

An Identity Authentication Scheme Based on Node Behaviors for Wireless Sensor Networks

Authors
Guanghui Chang, Shaofei Liang, Guangxia Xu
Corresponding Author
Guanghui Chang
Available Online April 2016.
DOI
10.2991/ameii-16.2016.242How to use a DOI?
Keywords
identity authentication, behaviors of node, trust mechanism, insider attack.
Abstract

Identity authentication is a crucial security issue in wireless sensor networks, because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attacks. We propose a new identity authentication scheme based on the behaviors of node in wireless sensor networks. Our scheme which depends on trust mechanism can resist the insider attacks effectively. With the total trust value integrated with direct trust value, recommendation trust value and history trust value of nodes, we can verify identity of nodes. Experiments indicate that our scheme is ideal to enhance the solution for identity authentication of nodes. Moreover, it can against the insider attacks effectively.

Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016)
Series
Advances in Engineering Research
Publication Date
April 2016
ISBN
978-94-6252-188-9
ISSN
2352-5401
DOI
10.2991/ameii-16.2016.242How to use a DOI?
Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Guanghui Chang
AU  - Shaofei Liang
AU  - Guangxia Xu
PY  - 2016/04
DA  - 2016/04
TI  - An Identity Authentication Scheme Based on Node Behaviors for Wireless Sensor Networks
BT  - Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016)
PB  - Atlantis Press
SN  - 2352-5401
UR  - https://doi.org/10.2991/ameii-16.2016.242
DO  - 10.2991/ameii-16.2016.242
ID  - Chang2016/04
ER  -