Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network

In Wireless Sensor Network (WSN) communication, authentication between the communicating nodes is an important aspect and has gained intensive interest from the researcher all around the world. With the advance of the technology where the communication devices are all in small form factor, high spee...

Full description

Saved in:
Bibliographic Details
Main Authors: Jamil N., Mahmood R.
Other Authors: 36682671900
Format: Conference Paper
Published: 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
id my.uniten.dspace-30458
record_format dspace
spelling my.uniten.dspace-304582024-04-18T10:13:06Z Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network Jamil N. Mahmood R. 36682671900 6506085008 Authentication Cellular Automata Wireless Sensor Network Approximation theory Cellular automata Communication Sensor nodes Wireless sensor networks Authentication scheme Communication device Fast implementation Low costs Message authentication codes Replay attack Security analysis Small form factors Temper resistance User authentication scheme Wireless sensor Authentication In Wireless Sensor Network (WSN) communication, authentication between the communicating nodes is an important aspect and has gained intensive interest from the researcher all around the world. With the advance of the technology where the communication devices are all in small form factor, high speed and low cost authentication scheme for generating Message Authentication Code (MAC) is definitely a demand. This paper introduces a new fast and lightweight authentication scheme based on Cellular Automata (CA) utilizing a so called Identity-bits Commitment embedded in a temper resistance chip inside the wireless sensors. The security analysis shows that our scheme is secure against thwart replay attack and lightweight for fast implementation. � 2011 IEEE. Final 2023-12-29T07:48:03Z 2023-12-29T07:48:03Z 2011 Conference Paper 10.1109/ICCSN.2011.6014075 2-s2.0-80053156581 https://www.scopus.com/inward/record.uri?eid=2-s2.0-80053156581&doi=10.1109%2fICCSN.2011.6014075&partnerID=40&md5=8eeafbdcb4807fa56e1660e2eca0799b https://irepository.uniten.edu.my/handle/123456789/30458 6014075 388 391 All Open Access; Green Open Access Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic Authentication
Cellular Automata
Wireless Sensor Network
Approximation theory
Cellular automata
Communication
Sensor nodes
Wireless sensor networks
Authentication scheme
Communication device
Fast implementation
Low costs
Message authentication codes
Replay attack
Security analysis
Small form factors
Temper resistance
User authentication scheme
Wireless sensor
Authentication
spellingShingle Authentication
Cellular Automata
Wireless Sensor Network
Approximation theory
Cellular automata
Communication
Sensor nodes
Wireless sensor networks
Authentication scheme
Communication device
Fast implementation
Low costs
Message authentication codes
Replay attack
Security analysis
Small form factors
Temper resistance
User authentication scheme
Wireless sensor
Authentication
Jamil N.
Mahmood R.
Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network
description In Wireless Sensor Network (WSN) communication, authentication between the communicating nodes is an important aspect and has gained intensive interest from the researcher all around the world. With the advance of the technology where the communication devices are all in small form factor, high speed and low cost authentication scheme for generating Message Authentication Code (MAC) is definitely a demand. This paper introduces a new fast and lightweight authentication scheme based on Cellular Automata (CA) utilizing a so called Identity-bits Commitment embedded in a temper resistance chip inside the wireless sensors. The security analysis shows that our scheme is secure against thwart replay attack and lightweight for fast implementation. � 2011 IEEE.
author2 36682671900
author_facet 36682671900
Jamil N.
Mahmood R.
format Conference Paper
author Jamil N.
Mahmood R.
author_sort Jamil N.
title Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network
title_short Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network
title_full Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network
title_fullStr Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network
title_full_unstemmed Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network
title_sort cellular automata based user authentication scheme using identity-bits commitment for wireless sensor network
publishDate 2023
_version_ 1806423304556249088