Online citations, reference lists, and bibliographies.
← Back to Search

A Novel User Authentication And Key Agreement Scheme For Heterogeneous Ad Hoc Wireless Sensor Networks, Based On The Internet Of Things Notion

Muhamed Turkanovic, Bostjan Brumen, Marko Hölbl
Published 2014 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Abstract The idea of the Internet of Things (IOT) notion is that everything within the global network is accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in such an environment, since they cover a wide application field. Such interconnection can be seen from the aspect of a remote user who can access a single desired sensor node from the WSN without the necessity of firstly connecting with a gateway node (GWN). This paper focuses on such an environment and proposes a novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks. The proposed scheme enables a remote user to securely negotiate a session key with a general sensor node, using a lightweight key agreement protocol. The proposed scheme ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user. The proposed scheme has been adapted to the resource-constrained architecture of the WSN, thus it uses only simple hash and XOR computations. Our proposed scheme tackles these risks and the challenges posed by the IOT, by ensuring high security and performance features.
This paper references
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1016/j.adhoc.2012.09.006
Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring
G. Owojaiye (2013)
10.1016/j.comnet.2009.02.023
Secure data aggregation in wireless sensor networks: A comprehensive overview
S. Özdemir (2009)
10.1109/MWC.2004.1368897
The design space of wireless sensor networks
K. Römer (2004)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1016/j.dss.2013.01.031
Optimal planning of sensor networks for asset tracking in hospital environments
A. Pietrabissa (2013)
10.1145/1029102.1029113
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
10.1016/j.chb.2012.01.015
Ubiquitous tutoring in laboratories based on wireless sensor networks
M. Jou (2013)
10.1016/j.adhoc.2012.09.005
An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring
V. Sivaraman (2013)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.1016/j.jnca.2012.10.002
Wireless sensor networks for rehabilitation applications: Challenges and opportunities
Abdelkrim Hadjidj (2013)
10.1109/COMSNETS.2009.4808919
An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks
A. K. Das (2009)
10.1109/IIHMSP.2010.14
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang (2010)
10.1109/MOBHOC.2007.4428758
Assessment of Energy Consumption in Wireless Sensor Networks: A Case Study for Security Algorithms
Chih-Chun Chang (2007)
10.1016/j.adhoc.2012.06.012
Autonomous precision agriculture through integration of wireless underground sensor networks with center pivot irrigation systems
X. Dong (2013)
10.1016/j.adhoc.2012.09.002
Design, development, and deployment of a wireless sensor network for detection of landslides
M. Ramesh (2014)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
10.15866/IRECOS.V8I1.2766
A New User Authentication Scheme for Hierarchical Wireless Sensor Networks
Shuaiwen Xu (2013)
10.1007/s11277-013-1543-8
Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”
Muhamed Turkanovic (2014)
10.1016/j.csi.2010.03.008
Advanced smart card based password authentication protocol
R. Song (2010)
10.5755/J01.EEE.19.6.2038
An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
Muhamed Turkanovic (2013)
10.1145/501449.501463
Distributed assignment of encoded MAC addresses in sensor networks
C. Schurgers (2001)
10.1016/J.APACOUST.2012.07.007
Novel wireless pervasive sensor network to improve the understanding of noise in street canyons
M. Bell (2013)
New directions in cryptography (invited paper)
W. Diffie (1976)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1016/j.jnca.2013.02.014
HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks
A. Rezaee (2014)
10.1016/j.medengphy.2011.09.010
eFurniture for home-based frailty detection using artificial neural networks and wireless sensors.
Y. Chang (2013)
10.1016/J.SNA.2012.11.047
Deployment and evaluation of a wireless sensor network for methane leak detection
A. Somov (2013)
10.1109/PACCS.2010.5626600
A secure and efficient user authentication protocol for two-tiered wireless sensor networks
Rong Fan (2010)
10.1016/J.TRC.2012.06.008
Wireless sensor networks for traffic monitoring in a logistic centre
Marco Bottero (2013)
10.1109/98.878532
Protocols for self-organization of a wireless sensor network
K. Sohrabi (2000)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
Protocols for selforganization of a wireless sensor network
K. Sohrabi (2000)
10.1007/s10796-014-9492-7
The internet of things: a survey
Shancang Li (2015)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1109/MC.2002.1039518
Denial of Service in Sensor Networks
A. Wood (2002)
10.1109/WIMOB.2010.5645004
Improved two-factor user authentication in wireless sensor networks
B. Vaidya (2010)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1016/S1389-1286(01)00302-4
Wireless sensor networks: a survey
I. Akyildiz (2002)
10.1016/j.adhoc.2010.09.008
BorderSense: Border patrol through advanced wireless sensor networks
Zhi Sun (2011)
An advanced temporal credentialbased security scheme with mutual authentication and key agreement for wireless sensor networks
C.-T. Li (2013)
10.1007/springerreference_213
Differential Power Analysis
Siva Sai Yerubandi (2002)
10.1016/j.csi.2008.09.006
An improved smart card based password authentication scheme with provable security
J. Xu (2009)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.5437/08956308X5703002
Design
Jim Euchner (2014)
Kumar
A. Das (2012)
10.1016/j.adhoc.2012.08.011
Survey and comparison of message authentication solutions on wireless sensor networks
M. A. Simplício (2013)
10.1016/J.CONBUILDMAT.2012.11.087
Wireless sensor networks for temperature and humidity monitoring within concrete structures
Norberto Barroca (2013)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1016/J.PROTCY.2012.10.119
Security Frameworks for Wireless Sensor Networks-Review
G. Sharma (2012)



This paper is referenced by
10.1109/JIOT.2017.2775248
Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things
Jian Shen (2018)
USER AUTHENTICATION IN INTERNET OF THINGS: A SURVEY
S. Jagadeesh (2017)
AN EFFICIENT USER AUTHENTICATICATION SCHEME FOR MULTIPLE ACCESSES SCENARIO IN WSN BASED IN IOT NOTION
Sheng-kai Yang (2019)
10.1016/j.jisa.2017.10.003
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network
Libing Wu (2017)
10.4018/978-1-7998-1090-2.ch007
Internet of Things-Based Authentication Mechanism for E-Health Applications
M. K. Rao (2020)
10.1109/ICISCT.2017.8188588
Problems of security networks internet things
S. G. Abdukhalilov (2017)
10.1007/978-981-15-3020-3_2
An Improved Authentication and Key Agreement Protocol for Smart Healthcare System in the Context of Internet of Things Using Elliptic Curve Cryptography
Uddalak Chatterjee (2020)
10.1109/ACCESS.2019.2926578
Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions
S. Banerjee (2019)
10.1002/dac.4332
Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme
Mahdi Nikooghadam (2020)
A Federated Lightweight Authentication Protocol for the Internet of Things
Maria L. B. A. Santos (2019)
10.1109/JSYST.2018.2866067
Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
Y. K. Ever (2019)
10.1007/S13369-019-03752-7
A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception
Lili Xu (2019)
10.1007/978-3-319-95165-2_4
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks
Taeui Song (2018)
10.1016/j.jisa.2017.01.003
A lightweight biometrics based remote user authentication scheme for IoT services
P. Dhillon (2017)
10.1109/ICFST.2017.8210493
Energy over-consumption induced by securing network operations
Maimouna Tedy Sow (2017)
10.1109/JSYST.2019.2899580
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems
X. Li (2020)
10.1007/s11227-020-03363-2
Robust session key generation protocol for social internet of vehicles with enhanced security provision
Seyed Abdolreza Eftekhari (2020)
10.1016/j.comcom.2019.12.004
UAVs assessment in software-defined IoT networks: An overview
Fadi Al-Turjman (2020)
10.1016/j.promfg.2020.01.247
Cyber-Enabled Product Lifecycle Management: A Multi-Agent Framework
V. V. Kumar (2019)
10.1016/j.comnet.2016.05.007
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
S. Kumari (2016)
10.1109/TEL-NET.2017.8343530
Framework for authentication and access control in IoT
Kossi Owoude Bate (2017)
10.3390/s18113663
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
Seyed Farhad Aghili (2018)
10.1007/s11042-017-5560-6
Signature-based three-factor authenticated key exchange for internet of things applications
Xiaoying Jia (2017)
10.1109/SSPS.2017.8071559
Mutual authentication for IoT smart environment using certificate-less public key cryptography
Dania Qara Bala (2017)
10.1109/TII.2020.2974258
Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections With Privacy Protection
Dariush Abbasinezhad-Mood (2020)
10.1007/S11277-017-4203-6
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
Y. Lu (2017)
10.1109/COMTECH.2019.8737799
An Improved three-factor anonymous Authentication Protocol for WSN s based IoT System Using Symmetric cryptography
Khwaja Jawad (2019)
10.1007/s11276-020-02422-z
Augmenting network lifetime for heterogenous WSN assisted IoT using mobile agent
H. Singh (2020)
Unlinkable User Authenticated Key Agreement for Multi-Gateway Wireless Sensor Networks
Solomon Kuonga Nkhoma (2018)
10.1109/ICIT.2017.56
A Survey on Authentication Schemes in IoT
K. Roy (2017)
10.1155/2018/7574238
A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
Yuwen Chen (2018)
10.1007/978-981-15-2777-7_28
A Hybrid Mutual Authentication Scheme Based on Blockchain Technology for WBANs
Jianbo Xu (2019)
See more
Semantic Scholar Logo Some data provided by SemanticScholar