Performance analysis of Authentication Information exchange Scheme in WSN

Sheng Kai Yang, Ya Ming Shiue, I. Hsien Liu, Zhi Yuan Su, Chuan Gang Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.

Original languageEnglish
Title of host publicationProceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages23-27
Number of pages5
ISBN (Electronic)9781728131597
DOIs
Publication statusPublished - 2019 Aug
Event2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019 - Tainan, Taiwan
Duration: 2019 Aug 302019 Sep 1

Publication series

NameProceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019

Conference

Conference2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019
CountryTaiwan
CityTainan
Period19-08-3019-09-01

Fingerprint

information exchange
Authentication
Industry
Technology
Research
performance
Sensor nodes
Wireless sensor networks
industry
communication
methodology
evaluation
Communication
Sensors

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Health Informatics
  • Communication
  • Social Sciences (miscellaneous)

Cite this

Yang, S. K., Shiue, Y. M., Liu, I. H., Su, Z. Y., & Liu, C. G. (2019). Performance analysis of Authentication Information exchange Scheme in WSN. In Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019 (pp. 23-27). [8858313] (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICEA.2019.8858313
Yang, Sheng Kai ; Shiue, Ya Ming ; Liu, I. Hsien ; Su, Zhi Yuan ; Liu, Chuan Gang. / Performance analysis of Authentication Information exchange Scheme in WSN. Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 23-27 (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019).
@inproceedings{68a2fcad653a450db482a4187857d4af,
title = "Performance analysis of Authentication Information exchange Scheme in WSN",
abstract = "In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.",
author = "Yang, {Sheng Kai} and Shiue, {Ya Ming} and Liu, {I. Hsien} and Su, {Zhi Yuan} and Liu, {Chuan Gang}",
year = "2019",
month = "8",
doi = "10.1109/ICEA.2019.8858313",
language = "English",
series = "Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "23--27",
booktitle = "Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019",
address = "United States",

}

Yang, SK, Shiue, YM, Liu, IH, Su, ZY & Liu, CG 2019, Performance analysis of Authentication Information exchange Scheme in WSN. in Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019., 8858313, Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019, Institute of Electrical and Electronics Engineers Inc., pp. 23-27, 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019, Tainan, Taiwan, 19-08-30. https://doi.org/10.1109/ICEA.2019.8858313

Performance analysis of Authentication Information exchange Scheme in WSN. / Yang, Sheng Kai; Shiue, Ya Ming; Liu, I. Hsien; Su, Zhi Yuan; Liu, Chuan Gang.

Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc., 2019. p. 23-27 8858313 (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Performance analysis of Authentication Information exchange Scheme in WSN

AU - Yang, Sheng Kai

AU - Shiue, Ya Ming

AU - Liu, I. Hsien

AU - Su, Zhi Yuan

AU - Liu, Chuan Gang

PY - 2019/8

Y1 - 2019/8

N2 - In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.

AB - In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.

UR - http://www.scopus.com/inward/record.url?scp=85074202243&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85074202243&partnerID=8YFLogxK

U2 - 10.1109/ICEA.2019.8858313

DO - 10.1109/ICEA.2019.8858313

M3 - Conference contribution

AN - SCOPUS:85074202243

T3 - Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019

SP - 23

EP - 27

BT - Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Yang SK, Shiue YM, Liu IH, Su ZY, Liu CG. Performance analysis of Authentication Information exchange Scheme in WSN. In Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc. 2019. p. 23-27. 8858313. (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019). https://doi.org/10.1109/ICEA.2019.8858313