Performance analysis of Authentication Information exchange Scheme in WSN

Sheng Kai Yang, Ya Ming Shiue, I. Hsien Liu, Zhi Yuan Su, Chuan Gang Liu

研究成果: Conference contribution

摘要

In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.

原文English
主出版物標題Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019
發行者Institute of Electrical and Electronics Engineers Inc.
頁面23-27
頁數5
ISBN(電子)9781728131597
DOIs
出版狀態Published - 2019 八月
事件2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019 - Tainan, Taiwan
持續時間: 2019 八月 302019 九月 1

出版系列

名字Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019

Conference

Conference2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019
國家Taiwan
城市Tainan
期間19-08-3019-09-01

指紋

information exchange
Authentication
Industry
Technology
Research
performance
Sensor nodes
Wireless sensor networks
industry
communication
methodology
evaluation
Communication
Sensors

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Health Informatics
  • Communication
  • Social Sciences (miscellaneous)

引用此文

Yang, S. K., Shiue, Y. M., Liu, I. H., Su, Z. Y., & Liu, C. G. (2019). Performance analysis of Authentication Information exchange Scheme in WSN. 於 Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019 (頁 23-27). [8858313] (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICEA.2019.8858313
Yang, Sheng Kai ; Shiue, Ya Ming ; Liu, I. Hsien ; Su, Zhi Yuan ; Liu, Chuan Gang. / Performance analysis of Authentication Information exchange Scheme in WSN. Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc., 2019. 頁 23-27 (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019).
@inproceedings{68a2fcad653a450db482a4187857d4af,
title = "Performance analysis of Authentication Information exchange Scheme in WSN",
abstract = "In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.",
author = "Yang, {Sheng Kai} and Shiue, {Ya Ming} and Liu, {I. Hsien} and Su, {Zhi Yuan} and Liu, {Chuan Gang}",
year = "2019",
month = "8",
doi = "10.1109/ICEA.2019.8858313",
language = "English",
series = "Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "23--27",
booktitle = "Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019",
address = "United States",

}

Yang, SK, Shiue, YM, Liu, IH, Su, ZY & Liu, CG 2019, Performance analysis of Authentication Information exchange Scheme in WSN. 於 Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019., 8858313, Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019, Institute of Electrical and Electronics Engineers Inc., 頁 23-27, 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019, Tainan, Taiwan, 19-08-30. https://doi.org/10.1109/ICEA.2019.8858313

Performance analysis of Authentication Information exchange Scheme in WSN. / Yang, Sheng Kai; Shiue, Ya Ming; Liu, I. Hsien; Su, Zhi Yuan; Liu, Chuan Gang.

Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc., 2019. p. 23-27 8858313 (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019).

研究成果: Conference contribution

TY - GEN

T1 - Performance analysis of Authentication Information exchange Scheme in WSN

AU - Yang, Sheng Kai

AU - Shiue, Ya Ming

AU - Liu, I. Hsien

AU - Su, Zhi Yuan

AU - Liu, Chuan Gang

PY - 2019/8

Y1 - 2019/8

N2 - In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.

AB - In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel authentication information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new authentication but just add our previous scheme in a previous authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for authentication information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.

UR - http://www.scopus.com/inward/record.url?scp=85074202243&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85074202243&partnerID=8YFLogxK

U2 - 10.1109/ICEA.2019.8858313

DO - 10.1109/ICEA.2019.8858313

M3 - Conference contribution

AN - SCOPUS:85074202243

T3 - Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019

SP - 23

EP - 27

BT - Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Yang SK, Shiue YM, Liu IH, Su ZY, Liu CG. Performance analysis of Authentication Information exchange Scheme in WSN. 於 Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc. 2019. p. 23-27. 8858313. (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019). https://doi.org/10.1109/ICEA.2019.8858313