A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

User authentication in wireless sensor networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained...

Full description

Saved in:
Bibliographic Details
Main Authors: Wenbo Shi, Peng Gong
Format: Article
Language:English
Published: Wiley 2013-04-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/730831
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849402260785725440
author Wenbo Shi
Peng Gong
author_facet Wenbo Shi
Peng Gong
author_sort Wenbo Shi
collection DOAJ
description User authentication in wireless sensor networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environments is a paramount security concern. To overcome the weaknesses of Yeh et al.'s protocol, we proposed a new authentication protocol for wireless sensor networks using elliptic curves cryptography. The comparisons show that our protocol is more suitable for WSNs.
format Article
id doaj-art-8b382d1a7d294b02bf65d70de101f2dd
institution Kabale University
issn 1550-1477
language English
publishDate 2013-04-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-8b382d1a7d294b02bf65d70de101f2dd2025-08-20T03:37:34ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-04-01910.1155/2013/730831A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves CryptographyWenbo Shi0Peng Gong1 Department of Electronic Engineering, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China National Key Laboratory of Mechatronic Engineering and Control, School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, ChinaUser authentication in wireless sensor networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environments is a paramount security concern. To overcome the weaknesses of Yeh et al.'s protocol, we proposed a new authentication protocol for wireless sensor networks using elliptic curves cryptography. The comparisons show that our protocol is more suitable for WSNs.https://doi.org/10.1155/2013/730831
spellingShingle Wenbo Shi
Peng Gong
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
International Journal of Distributed Sensor Networks
title A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_full A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_fullStr A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_full_unstemmed A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_short A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_sort new user authentication protocol for wireless sensor networks using elliptic curves cryptography
url https://doi.org/10.1155/2013/730831
work_keys_str_mv AT wenboshi anewuserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT penggong anewuserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT wenboshi newuserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT penggong newuserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography