Online citations, reference lists, and bibliographies.
← Back to Search

A Secure And Effective Biometric-based User Authentication Scheme For Wireless Sensor Networks Using Smart Card And Fuzzy Extractor

A. K. Das
Published 2017 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Summary User authentication is a prominent security requirement in wireless sensor networks (WSNs) for accessing the real-time data from the sensors directly by a legitimate user (external party). Several user authentication schemes are proposed in the literature. However, most of them are either vulnerable to different known attacks or they are inefficient. Recently, Althobaiti et al. presented a biometric-based user authentication scheme for WSNs. Although their scheme is efficient in computation, in this paper, we first show that their scheme has several security pitfalls such as (i) it is not resilient against node capture attack; (ii) it is insecure against impersonation attack; and (iii) it is insecure against man-in-the-middle attack. We then aim to propose a novel biometric-based user authentication scheme suitable for WSNs in order to withstand the security pitfalls found in Althobaiti et al. scheme. We show through the rigorous security analysis that our scheme is secure and satisfies the desirable security requirements. Furthermore, the simulation results for the formal security verification using the most widely used and accepted Automated Validation of Internet Security Protocols and Applications tool indicate that our scheme is secure. Our scheme is also efficient compared with existing related schemes. Copyright © 2015 John Wiley & Sons, Ltd.
This paper references
10.1002/wcm.422
Security in wireless sensor networks
V. C. Giruka (2008)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1002/dac.2617
Recent issues in wireless sensor networks
H. Chen (2013)
10.1007/s10623-005-6344-y
Some Observations on the Theory of Cryptographic Hash Functions
D. Stinson (2006)
10.1137/060651380
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis (2003)
The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA
David von Oheimb (2005)
10.1142/S0129626411000047
Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks
C. Lee (2011)
10.1155/2013/407971
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
O. Althobaiti (2013)
10.1002/dac.2412
High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks
Chen-Xu Liu (2013)
10.1109/WAINA.2013.22
A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks
A. K. Das (2013)
10.1109/ISWPC.2013.6707446
A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
D. He (2013)
A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks
A. K. Das (2015)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
Automated validation of internet security protocols and applications
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications 2014:1–22
AK Das (2013)
10.1016/j.ins.2013.10.022
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Vanga Odelu (2014)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1002/dac.2506
A fault-tolerant group key agreement protocol exploiting dynamic setting
Zi-Yao Cheng (2013)
10.1007/s00779-012-0540-3
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
Da-Zhi Sun (2012)
10.1109/WIMOB.2010.5645004
Improved two-factor user authentication in wireless sensor networks
B. Vaidya (2010)
10.1002/dac.1384
Energy-efficient and localized lossy data aggregation in asynchronous sensor networks
Jianhui Zhang (2013)
10.1145/1880022.1880027
A Simple and Generic Construction of Authenticated Encryption with Associated Data
P. Sarkar (2010)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.1002/dac.2376
TREE: Routing strategy with guarantee of QoS for industrial wireless sensor networks
Liang Xue (2014)
A secure and efficient user authentication protocol for two-tieres wireless sensor networks
R Fan (2010)
10.1007/s10916-013-9948-1
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
A. K. Das (2013)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.1155/2013/956736
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks
M. Khan (2013)
10.1007/s10916-011-9700-7
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
Shuhua Wu (2011)
A survey on analytic studies of key distribution mechanisms in wireless sensor networks
AK Das (2010)
10.1002/dac.2355
An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks
Y. Wang (2012)
10.1016/j.adhoc.2014.03.003
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
Ding Wang (2014)
10.1002/nem.739
An efficient dynamic group key agreement protocol for imbalanced wireless networks
Yun-Hsin Chuang (2010)
10.1007/978-3-662-44966-0_1
Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks
A. K. Das (2014)
FIPS PUB 180-1, National Institute of Standards and Technology (NIST)
S H Standard (1995)
10.1155/2012/382810
A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
S. Yoo (2012)
10.1007/s12083-014-0285-z
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)
10.1002/dac.2492
A hybrid localization and tracking system in camera sensor networks
D. Gao (2014)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
FIPS-PUB-180-1
Air Force Air Force Materiel Command Hq (1995)
10.1504/IJTMCC.2014.067303
A survey on user access control in wireless sensor networks with formal security verification
S. Chatterjee (2014)
10.1007/springerreference_213
Differential Power Analysis
Siva Sai Yerubandi (2002)
10.32628/CSEIT1722154
Enhanced Three-Factor Security Protocol For Consumer USB Mass Storage Devices
K. Kamthe (2017)
Peer to Peer Networking and Applications
Adarsh Agarwal (2013)
10.1007/s12083-014-0324-9
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
A. K. Das (2016)
10.1007/s10916-010-9449-4
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
M. A. Ameen (2010)
10.1002/dac.2344
An indicator kriging method for distributed estimation in wireless sensor networks
Guiyun Liu (2014)
10.1007/978-3-642-40576-1_24
Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks
A. K. Das (2013)
10.6633/IJNS.200711.5(3).08
A Biometric Identity Based Signature Scheme
A. Burnett (2007)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1007/11513988_27
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
A. Armando (2005)
10.1007/s10916-013-9971-2
An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1
M. L. M. Kiah (2013)
10.1016/S1389-1286(01)00302-4
Wireless sensor networks: a survey
I. Akyildiz (2002)
Analysis formal security verification of access control schemes in wireless sensor networks: a critical survey
S Chatterjee (2013)
10.1002/dac.2315
DDRP: An efficient data-driven routing protocol for wireless sensor networks with mobile sinks
Lei Shi (2013)
10.1007/s10207-004-0055-7
OFMC: A symbolic model checker for security protocols
D. Basin (2004)
10.1007/s11859-010-0318-2
A biometric-based user authentication for wireless sensor networks
J. Yuan (2010)



This paper is referenced by
10.3390/s17050940
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks
Jongho Moon (2017)
10.1002/sec.1652
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
M. Wazid (2016)
10.1007/s11432-019-1508-6
PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
Chang Xu (2020)
10.1109/TDSC.2017.2764083
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
M. Wazid (2020)
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
10.3390/info8040136
Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things
A. Maurya (2017)
10.1109/CIC.2017.00032
Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter
A. Maurya (2017)
10.1007/S11276-017-1604-0
Anonymous three-factor authenticated key agreement for wireless sensor networks
Y. Lu (2019)
10.1051/matecconf/202030902001
A new three-factor authentication scheme overcome repeat registered attack for wireless sensor networks
Ye Li (2020)
10.1109/ACCESS.2017.2673239
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Q. Jiang (2017)
10.1016/J.JISA.2019.03.008
A secure authentication protocol for wearable devices environment using ECC
Devender Kumar (2019)
10.1177/1550147716658607
Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks
YoHan Park (2016)
10.1109/TIFS.2016.2647225
Anonymous Secure Framework in Connected Smart Home Environments
P. Kumar (2017)
10.1002/sec.1464
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
10.1007/s11277-020-07385-0
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
10.1177/1550147718768994
The state-of-the-art wireless body area sensor networks: A survey
R. A. Khan (2018)
10.1007/S12652-020-02532-8
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
Devender Kumar (2020)
10.1080/09720529.2019.1627072
A secure three-factor authentication scheme for wireless sensor networks using ECC
Devender Kumar (2020)
10.1109/ACCESS.2019.2962829
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges
Sumit Pundir (2020)
10.1109/CAIS.2019.8769546
Improve the security over the wireless sensor networks in medical sector
Albandari Alsumayt (2019)
10.1016/j.cmpb.2016.07.022
Secure anonymous mutual authentication for star two-tier wireless body area networks
M. Ibrahim (2016)
10.3390/s20051300
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
Sumit Pundir (2020)
10.3390/s16122123
Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
YoHan Park (2016)
10.1007/978-981-10-6898-0_4
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition
A. Maurya (2017)
10.3390/cryptography3030024
Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device
Alzahraa J. Mohammed (2019)
10.1155/2017/6562953
Authentication Protocols for Internet of Things: A Comprehensive Survey
M. Ferrag (2017)
10.1109/TSG.2018.2857558
Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks
P. Kumar (2019)
10.1002/DAC.3514
On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC
Anil Kumar Sutrala (2018)
10.1109/JIOT.2017.2706752
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
M. Wazid (2017)
10.20944/preprints201811.0239.v1
Improvement of Wu et al.'s Three-Factor User Authentication Scheme for Wireless Sensor Networks
Jihyeon Ryu (2018)
LTCHA : LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD
V. Vasanthi (2019)
10.1155/2017/1378128
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
Jongho Moon (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar