About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
inis 19(21): e1

Research Article

A Secure Authentication Scheme based on Brownian Motion in hierarchy Wireless Sensor Networks

Download1274 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.13-7-2018.160389,
        author={Minh  Hoang  Trong and Ngoc  Le  Van and Nguyen  Lang  Tuan and Hai  Hoang  Dang},
        title={A Secure Authentication Scheme based on Brownian Motion in hierarchy Wireless Sensor Networks},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={6},
        number={21},
        publisher={EAI},
        journal_a={INIS},
        year={2019},
        month={9},
        keywords={wireless sensor networks, authentication, Brownian motion, watermark technique},
        doi={10.4108/eai.13-7-2018.160389}
    }
    
  • Minh Hoang Trong
    Ngoc Le Van
    Nguyen Lang Tuan
    Hai Hoang Dang
    Year: 2019
    A Secure Authentication Scheme based on Brownian Motion in hierarchy Wireless Sensor Networks
    INIS
    EAI
    DOI: 10.4108/eai.13-7-2018.160389
Minh Hoang Trong1,*, Ngoc Le Van1, Nguyen Lang Tuan1, Hai Hoang Dang1
  • 1: Posts and Telecommunication Institute of Technology, Hanoi, Vietnam
*Contact email: hoangtrongminh@ptit.edu.vn

Abstract

In the last few years, the Internet of Things (IoT) has experienced exponential advancements. In IoT infrastructures, Wireless Sensor Network (WSN) has been considered as one of the crucial technologies to support a lot of amazing services. To fulfill new requirements of deployed network environments, the security issue in wireless sensor networks has to be met new challenges such as secured and lightweight requirements simultaneously. Hence, in this paper, an authentication scheme based on the watermarking technique is proposed to secure the sensory data in hierarchy wireless sensor networks. Especially, natural movement characteristics of a sensor node are exploited to provide a conveniently watermarked data, that can be used to validate and detect data integrity attacks in familiar methods. The proposed authentication scheme is evaluated by numerical results and theoretically analyzed to prove a proposal efficiency.

Keywords
wireless sensor networks, authentication, Brownian motion, watermark technique
Received
2019-09-06
Accepted
2019-09-19
Published
2019-09-24
Publisher
EAI
http://dx.doi.org/10.4108/eai.13-7-2018.160389

Copyright © 2019 Minh Hoang Trong et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL