Network Configuration. This section briefly reviews ▇▇▇ et al.’s network configuration for the better understanding ▇▇▇▇▇ et al.’s scheme and the proposed scheme for WSNs [12]. Xue et al.’s network configuration provides five basic models but this paper only will consider a specific model that user only could access data on the sensor nodes via GWN but not directly from them. The model is consisted with three main parties as shown in Fig. 1, which are user, GWN, and sensor nodes over a WSN. GWN plays an important role in the network. In order to further reach the specific sensor node, remote user is required to reach GWN through Internet at first. Contrary, sensing data from the sensor nodes firstly gets to GWN and further reaches the end user. If the data in the WSN is made available to the remote user on demand, mutual authentication between them must be ensured before allowing the remote user to access. With the aid of GWN, impenetrability of lightweight mutual authentication is going to be possible. Since the sensor nodes are deployed in harsh environments, authentication of the GWN is necessary for the user and the sensor node. Three parties have the following functionalities User: To read data on the sensor nodes over the WSN, user needs to have rights to access them via GWN, which requires to be registered on the GWN. GWN: GWN works as an authentication server over the WSN and intervenes between user and the sensor nodes. Sensor node: To provide sensed data, it only communicates with the authenticated GWN not with the user.
Appears in 2 contracts
Sources: Authenticated Key Agreement Scheme, Authenticated Key Agreement Scheme