Security Authentication Scheme Research for Wireless Sensor Networks
2014 ◽
Vol 687-691
◽
pp. 1802-1805
Keyword(s):
Existing security authentication schemes are mostly concentrated on the key management and cryptographic algorithms. However, there are few authentication schemes designed according to the application needs. To solve this problem, considering the limited resource of wireless sensor networks and the practical application, a partially distributed authentication scheme is proposed. We use hierarchical network structure. Centralized authentication is used between the base station and cluster head nodes, while cluster head node and ordinary nodes use a distributed authentication. Analysis shows that this method has some advantages in the overhead of the storage, computing and communication, while network security can be guaranteed.
2014 ◽
Vol 998-999
◽
pp. 1092-1095
Keyword(s):
2019 ◽
Vol 8
(5S3)
◽
pp. 128-132
◽
Keyword(s):
Keyword(s):
Keyword(s):
Keyword(s):
2011 ◽
Vol 179-180
◽
pp. 728-733
2018 ◽
Vol 2018
◽
pp. 1-11
◽
Keyword(s):