Journal of Software Engineering1819-43112152-0941Asian Network for Scientific Information10.3923/jse.2015.114.120LiYongming YangQinghua WangLiejun DanTong 1201591Identity authentication is the first safeguard for security of Wireless Sensor
Networks (WSNs). Because of the efficiency and safety issues of the existing
identity authentication protocol in WSNs, a low-power identity authentication
protocol which is based on Shamir-threshold-secret sharing scheme is proposed.
In the premise of not compromising the networks
security, the new node need to be checked by the majority of authorized nodes,
therefore, the consumption of computation can be reduced effectively during
the process of authentication. One-way hash function is used for encrypting
communication data and also the timestamp mechanism for being against reply
attacks in authentication process. Analytical results show that the protocol
is low-power consumption and has the ability of resisting eavesdropping attacks,
replaying attack and attack of a few nodes captured.]]>Wang, C., G.Y. Hu and H.G. Zhang,2012333035Cao, T.J. and H. Lei,200836397401Zhou, J.L., C.X. Li and Q.Y. Cao,20092643194321, 4324Yan, T. and Q. Wen,20122012pp: 123-130pp: 123-130Zeng, P., L. Zhang, R.L. Hu, Y. Yang and P. Liu,2014506569Zuo, B., Y.H. Guo, C.Y. Luo and W. Li,201036142144Bogdanov, A., M. Knezevic, G. Leander, D. Toz, K. Varici and I. Verbauwhede,20112011pp: 312-325pp: 312-325Xu, C.X. and G.Z. Xiao,20043216881689Liu, L.H. and Y. Shen,20092611041108