Limits...
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

Lee TF - Sensors (Basel) (2015)

Bottom Line: The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key.However, these schemes cannot protect the privacy of users and withstand possible attacks.The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

View Article: PubMed Central - PubMed

Affiliation: Department of Medical Informatics, Tzu Chi University, No. 701, Zhongyang Road, Sec. 3, Hualien 97004, Taiwan. jackytflee@mail.tcu.edu.tw.

ABSTRACT
A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

No MeSH data available.


Related in: MedlinePlus

The login and authentication phase of the proposed scheme for WSNs.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541817&req=5

sensors-15-14960-f001: The login and authentication phase of the proposed scheme for WSNs.

Mentions: In this phase, as shown in Figure 1, Ui and GWN authenticate each other by performing the following steps:Step 1:


Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

Lee TF - Sensors (Basel) (2015)

The login and authentication phase of the proposed scheme for WSNs.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541817&req=5

sensors-15-14960-f001: The login and authentication phase of the proposed scheme for WSNs.
Mentions: In this phase, as shown in Figure 1, Ui and GWN authenticate each other by performing the following steps:Step 1:

Bottom Line: The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key.However, these schemes cannot protect the privacy of users and withstand possible attacks.The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

View Article: PubMed Central - PubMed

Affiliation: Department of Medical Informatics, Tzu Chi University, No. 701, Zhongyang Road, Sec. 3, Hualien 97004, Taiwan. jackytflee@mail.tcu.edu.tw.

ABSTRACT
A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

No MeSH data available.


Related in: MedlinePlus