Analysis and Extension of Benenson's Robust User Authentication Scheme

Authors

W. M. z. Bergsten, R. Mathar,

Abstract

        Benenson, Gedicke and Raivio proposed a user authentication scheme for sensor networks. The scheme considers how to organize access control to a wireless sensor network for authorized users and rejection of unauthorized adversaries.
In the first part of this paper we analyse and optimize the proposed authentication scheme.
The second part deals with distribution of public keys to sensor nodes. Benenson's protocol requires periodic distribution of a certification authority's public key to sensor nodes. Considering wireless sensor network applications, these updates have to be
accomplished over the air on a deployed network. We propose a wireless, online reconfiguration scheme implementing the key distribution.

BibTEX Reference Entry 

@inproceedings{BeMa10,
	author = {Wolfgang Meyer zu Bergsten and Rudolf Mathar},
	title = "Analysis and Extension of Benenson's Robust User Authentication  Scheme",
	pages = "897-901",
	booktitle = "7th International Symposium on Wireless Communication Systems ({IEEE} ISWCS)",
	address = {York, United Kingdom},
	month = Oct,
	year = 2010,
	hsb = hsb999910016294,
	}

Downloads

 Download paper  Download bibtex-file

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights there in are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.