TY - GEN
T1 - Performance analysis of Authentication Information exchange Scheme in WSN
AU - Yang, Sheng Kai
AU - Shiue, Ya Ming
AU - Liu, I. Hsien
AU - Su, Zhi Yuan
AU - Liu, Chuan Gang
PY - 2019/8
Y1 - 2019/8
N2 - In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.
AB - In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.
UR - http://www.scopus.com/inward/record.url?scp=85074202243&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85074202243&partnerID=8YFLogxK
U2 - 10.1109/ICEA.2019.8858313
DO - 10.1109/ICEA.2019.8858313
M3 - Conference contribution
T3 - Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019
SP - 23
EP - 27
BT - Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019
Y2 - 30 August 2019 through 1 September 2019
ER -