An Identity Authentication Scheme Based on Node Behaviors for Wireless Sensor Networks
- https://doi.org/10.2991/ameii-16.2016.242How to use a DOI?
- identity authentication, behaviors of node, trust mechanism, insider attack.
Identity authentication is a crucial security issue in wireless sensor networks, because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attacks. We propose a new identity authentication scheme based on the behaviors of node in wireless sensor networks. Our scheme which depends on trust mechanism can resist the insider attacks effectively. With the total trust value integrated with direct trust value, recommendation trust value and history trust value of nodes, we can verify identity of nodes. Experiments indicate that our scheme is ideal to enhance the solution for identity authentication of nodes. Moreover, it can against the insider attacks effectively.
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Guanghui Chang AU - Shaofei Liang AU - Guangxia Xu PY - 2016/04 DA - 2016/04 TI - An Identity Authentication Scheme Based on Node Behaviors for Wireless Sensor Networks BT - Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) PB - Atlantis Press SN - 2352-5401 UR - https://doi.org/10.2991/ameii-16.2016.242 DO - https://doi.org/10.2991/ameii-16.2016.242 ID - Chang2016/04 ER -