Security Solution For Real-Time Data Access In Wireless Sensor Networks

Hanguang Luo,Guangjun Wen,Jian Su
DOI: https://doi.org/10.1007/978-3-030-00021-9_4
2018-01-01
Abstract:Wireless Sensor Networks (WSNs) have rapidly increased to be applicable in many different areas due to their wireless mobile connectivity, large scale deployment and ad hoc network. However, these characteristics make WSNs usually deployed in unattended and hostile field, which may bring some new threats such as information tampering and eavesdropping attacks, etc. User authentication is one of the most important security services that allowed the legitimate user to query and collect the real-time data from a sensor node in WSN. Since the sensor nodes are resource-constrained devices which have limited storage, power and computing resource, the proposed authentication scheme must be low cost and lightweight. Recently, Gope et al. proposed a realistic lightweight authentication for real-time data access in WSN. Unfortunately, through our analysis we identified several flaws exist in their scheme as well as exist in other two-factor schemes. In order to withstand these threats, in this paper, we proposed some solutions to withstand the problems in Gope et al.' s and other schemes. Our solutions provide an important reference for security data access in WSN.
What problem does this paper attempt to address?