Online citations, reference lists, and bibliographies.
← Back to Search

Secure And Efficient User Authentication Scheme For Multi-gateway Wireless Sensor Networks

J. Srinivas, S. Mukhopadhyay, Dheerendra Mishra
Published 2017 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
By utilizing Internet of Things (IoT), the collected information from the sensor nodes in wireless sensor networks (WSNs) could be provided to the users who are permitted to get access of sensor nodes. As the information from the sensors are transmitted via public network and sensor nodes have limited battery, shift the focus on security and efficiency in WSNs. User authentication is the security task for limiting the access. It is achieved by equipping authorized users with passwords, tokens or biometrics. However, password and token are easy being stolen and forgotten; even biometrics inherit some limitation. More suitable approach is to combine both password and biometric authenticator to harvest benefits in security. This paper proposes a novel authentication and key agreement scheme for WSNs using biohashing. Biohashing facilitates elimination of false accept rates without increasing occurrence of false rejection rate. Additionally, biohashing has highly clear separation of imposter populations and genuine, and zero equal error rate level. The proposed scheme also supports dynamic node addition and user friendly password change mechanism. Using the BAN-logic, we prove that the proposed scheme provides mutual authentication. In addition, we simulate proposed scheme for the security against man-in-the middle attack and replay attack using the AVISPA tool, and the simulation results show that our scheme is safe. Through the informal security analysis, we show that the proposed scheme is secure against the known attacks for authentication protocols.
This paper references
10.1016/j.patcog.2004.04.011
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
A. Teoh (2004)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
10.1109/MP.2003.1197877
Sensor networks: an overview
M. Tubaishat (2003)
Kerckhoffs ’ principle for intrusion detection , in : Telecommunications Network Strategy and Planning Symposium , 2008
R. Needham (1990)
10.1007/s12083-015-0400-9
An improved and provably secure privacy preserving authentication protocol for SIP
Shehzad Ashraf Chaudhry (2017)
10.1016/S0167-4048(99)80136-9
Password authentication schemes with smart cards
Wen-Her Yang (1999)
10.1109/IIHMSP.2010.14
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang (2010)
10.1007/3-540-48405-1_25
Differential Power Analysis
Paul C. Kocher (1999)
10.1109/TIFS.2015.2439964
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
Vanga Odelu (2015)
10.1145/77648.77649
A logic of authentication
M. Burrows (1990)
10.1007/s11277-015-2621-x
Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems
B. D. Deebak (2016)
10.1109/JSYST.2016.2574719
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Qi Jiang (2018)
10.1016/j.adhoc.2014.11.018
User authentication schemes for wireless sensor networks: A review
S. Kumari (2015)
10.1007/s11277-015-3139-y
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks
Shehzad Ashraf Chaudhry (2017)
and X
A. K. Das (2016)
10.1049/EL.2011.1525
Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system
L. Nanni (2011)
10.1007/978-3-319-23829-6_11
On the Usability of Two-Factor Authentication
Ding Wang (2014)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1515/9783111576855-015
J
Seguin Hen (1824)
10.1016/j.jcss.2013.07.004
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
K. Xue (2014)
10.1016/j.patrec.2007.10.005
Random subspace for an improved BioHashing for face authentication
L. Nanni (2008)
10.1007/s11227-014-1198-6
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks
Hang Tu (2014)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.1016/j.adhoc.2015.05.020
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
R. Amin (2016)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1007/978-3-642-34601-9_35
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture
Ding Wang (2012)
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1109/JSYST.2014.2301517
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
D. He (2015)
10.1002/sec.1464
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
10.1007/978-3-540-85174-5_12
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme
Thomas Eisenbarth (2008)
10.1007/11513988_27
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
A. Armando (2005)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1007/978-3-642-00641-8_41
A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem
B. Baldwin (2009)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1109/TDSC.2014.2355850
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang (2015)
10.1016/j.ins.2015.02.010
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
10.1016/j.adhoc.2015.05.014
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
10.1109/NETWKS.2008.4763730
Kerckhoffs' principle for intrusion detection
S. Mrdović (2008)
10.1007/s10916-015-0244-0
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
Shehzad Ashraf Chaudhry (2015)
10.1109/WIMOB.2010.5645004
Improved two-factor user authentication in wireless sensor networks
B. Vaidya (2010)
The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA
David von Oheimb (2005)
10.1016/j.adhoc.2014.03.009
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
10.5755/J01.EEE.19.6.2038
An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
Muhamed Turkanovic (2013)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.1016/j.comnet.2014.07.010
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang (2014)
10.1007/s00530-015-0476-3
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
F. Wu (2015)
10.1007/s11277-013-1543-8
Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”
Muhamed Turkanovic (2014)
10.1016/j.ins.2015.03.070
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Ding Wang (2015)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1016/j.comnet.2008.04.002
Wireless sensor network survey
J. Yick (2008)
10.1007/s10916-015-0335-y
An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography
Shehzad Ashraf Chaudhry (2015)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1016/j.adhoc.2014.03.003
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
Ding Wang (2014)
10.1002/sec.517
Two-factor mutual authentication with key agreement in wireless sensor networks
B. Vaidya (2016)
10.15866/IRECOS.V8I1.2766
A New User Authentication Scheme for Hierarchical Wireless Sensor Networks
Shuaiwen Xu (2013)



This paper is referenced by
10.3390/s19051141
A Survey of Internet of Things (IoT) Authentication Schemes †
Mohammed El-hajj (2019)
10.1109/ACCESS.2020.3000790
On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks
Joonyoung Lee (2020)
10.4018/ijncr.2020070103
Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks
Anusha Vangala (2020)
Unlinkable User Authenticated Key Agreement for Multi-Gateway Wireless Sensor Networks
Solomon Kuonga Nkhoma (2018)
10.1016/j.jnca.2019.102496
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
M. Wazid (2020)
10.1049/iet-sen.2020.0006
Taxonomy of secure data dissemination techniques for IoT environment
Umesh Bodkhe (2020)
10.1109/ACCESS.2019.2931217
A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
Favian Dewanta (2019)
10.4108/eai.13-7-2018.163998
Secured Authentication Systems for Internet of Things
M. Gowtham (2020)
10.1109/SCORED.2017.8305419
Taxonomy of authentication techniques in Internet of Things (IoT)
Mohammed El-hajj (2017)
10.12694/scpe.v21i3.1746
A Parallelization based Data Management Framework for Pervasive IoT Applications
S. Zahoor (2020)
10.1002/ett.4033
A lightweight authentication and key exchange mechanism for IPv6 over low‐power wireless personal area networks‐based Internet of things
Leki Chom Thungon (2020)
10.1155/2019/5935292
A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function
Jin Wook Byun (2019)
10.1145/3341325.3342039
User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT
M. Ak̲h̲tar (2019)
10.1007/s11277-020-07385-0
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
10.1145/3325130
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs
Ding Wang (2020)
10.1177/1550147719879379
Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things
B. Yu (2019)
10.1002/mop.32107
A novel chaotic modulation approach of packaged antenna for secured wireless medical sensor network in E‐healthcare applications
C. Jayawickrama (2020)
10.1145/3338507.3358618
New Features of Authentication Scheme for the IoT: A Survey
Ting Yang (2019)
10.1109/ICIT48102.2019.00045
A Study of Authentication Protocols in Internet of Things
A. K. Sahu (2019)
10.1016/J.ADHOC.2019.03.003
Light-weight hashing method for user authentication in Internet-of-Things
V. Rao (2019)
10.1016/J.SYSARC.2018.12.005
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
M. Wazid (2019)
10.1109/JCN.2019.000048
On the security aspects of Internet of Things: A systematic literature review
Evandro L. C. Macedo (2019)
10.1109/ACCESS.2019.2947723
Review on Security of Internet of Things Authentication Mechanism
Tarak Nandy (2019)
10.3390/s19102358
Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments
Joonyoung Lee (2019)
10.1109/CSNET.2017.8242006
Analysis of authentication techniques in Internet of Things (IoT)
Mohammed El-hajj (2017)
Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
Yoney Kirsal Ever (2019)
10.1109/WISPNET.2017.8300123
A wireless pressure sensor node with temperature compensation function
Sujun Yang (2017)
10.1155/2018/8539674
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
Wenting Li (2018)
10.3390/s19245539
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment
M. Wazid (2019)
10.1109/ACCESS.2018.2880225
An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN
M. Alotaibi (2018)
10.1109/ACCESS.2018.2884541
Registration Center Based User Authentication Scheme for Smart E-Governance Applications in Smart Cities
Saud S. Alotaibi (2019)
10.1016/J.ADHOC.2019.101948
Enhanced authentication and key management scheme for securing data transmission in the internet of things
Y. Harbi (2019)
See more
Semantic Scholar Logo Some data provided by SemanticScholar