About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Towards new e-Infrastructure and e-Services for Developing Countries. 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23–25, 2023, Proceedings, Part I

Research Article

Lightweight Authentication System for Software-Defined Wireless Sensor Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-81570-6_10,
        author={Amado Illy and Youssou Faye and Tiguiane Yelemou},
        title={Lightweight Authentication System for Software-Defined Wireless Sensor Networks},
        proceedings={Towards new e-Infrastructure and e-Services for Developing Countries. 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23--25, 2023, Proceedings, Part I},
        proceedings_a={AFRICOMM},
        year={2025},
        month={2},
        keywords={Resource-constrained networks Sybil attack Authentication Elliptic curves},
        doi={10.1007/978-3-031-81570-6_10}
    }
    
  • Amado Illy
    Youssou Faye
    Tiguiane Yelemou
    Year: 2025
    Lightweight Authentication System for Software-Defined Wireless Sensor Networks
    AFRICOMM
    Springer
    DOI: 10.1007/978-3-031-81570-6_10
Amado Illy,*, Youssou Faye, Tiguiane Yelemou
    *Contact email: amedilly65@gmail.com

    Abstract

    Sybil attack consists to generate several false identities in order to bypass access control and thus produce false messages to seriously undermine the normal operation of Wireless Sensor Networks (WSN). It is considered one of the major threats to WSNs. The problem has been widely taken into account by researchers. However, detecting this attack and effectively countering it in the context of resource-constrained connected objects remains a challenge. In this paper, we propose a lightweight authentication system based on elliptic curve cryptography to counter this attack. This asymmetric encryption system uses smaller encryption keys than RSA and EL-Gamal, but offers the same level of security.

    Keywords
    Resource-constrained networks Sybil attack Authentication Elliptic curves
    Published
    2025-02-12
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-031-81570-6_10
    Copyright © 2023–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL