Online citations, reference lists, and bibliographies.
← Back to Search

A Secure User Authentication And Key-agreement Scheme Using Wireless Sensor Networks For Agriculture Monitoring

R. Ali, A. Pal, S. Kumari, M. Karuppiah, M. Conti
Published 2018 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Abstract Agriculture is the backbone of our economic system and plays an important role in the life of an economy. It does not only provide raw material and food, but also provides large employment opportunities. Therefore, agriculture requires modern technology for increasing the productivity. In this context, wireless sensor networks ( WSNs ) could be utilized for monitoring the climatic parameters such as (temperature, humidity, light, carbon dioxide, soil moisture, acidity etc.) in an agriculture field. The climatic parameters are very important in terms of growth, quality and productivity of crops. But, any kind of interception, modification, insertion, and deletion on these parameters can have negative effect on crop. Therefore, security and privacy are important issues in agriculture field. In this regard, we design a novel remote user authentication scheme using wireless sensor networks for agriculture monitoring. The protocol is validated through Burrows–Abadi–Needham (BAN) logic and also simulated using Automated Validation Information Security Protocols and Applications ( AVISPA ) tool. We formally analyze the security of the scheme using random oracle model. In addition, the informal security analysis shows that the proposed protocol is secure and resists various kinds of malicious attacks. As a results, the proposed protocol is applicable in a real life application.
This paper references
10.5755/J01.EEE.19.6.2038
An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
Muhamed Turkanovic (2013)
10.1007/s11277-013-1547-4
A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks
WenBin Hsieh (2014)
10.1016/j.future.2016.10.004
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S. Kumari (2017)
10.1016/j.future.2017.01.017
Time efficient secure DNA based access control model for cloud computing environment
S. Namasudra (2017)
10.1016/j.future.2016.11.019
Models and data engineering
L. Bellatreche (2017)
10.1016/j.adhoc.2015.05.014
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
10.1016/j.comnet.2016.05.007
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
S. Kumari (2016)
10.1002/sec.517
Two-factor mutual authentication with key agreement in wireless sensor networks
B. Vaidya (2016)
10.1007/978-81-322-1823-4_22
A Secure and Efficient Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks
C. Vorugunti (2014)
10.4018/IJBDCN.2016070104
A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
Preeti Chandrakar (2016)
10.4018/IJBDCN.2017010108
Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment
Preeti Chandrakar (2017)
10.1007/11513988_27
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
A. Armando (2005)
10.1016/j.future.2016.09.009
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
Vanga Odelu (2017)
10.1007/s00530-013-0346-9
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D. He (2013)
10.1109/TDSC.2014.2355850
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang (2015)
10.1145/77648.77649
A logic of authentication
M. Burrows (1990)
10.1002/sec.1139
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
Vanga Odelu (2015)
10.1016/j.comnet.2016.01.006
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
10.1007/springerreference_213
Differential Power Analysis
Siva Sai Yerubandi (2002)
Risks, Farmers’ Suicides and Agrarian Crisis in India: Is There a Way Out?
S. Mishra (2007)
10.1016/j.comcom.2017.05.009
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC
Preeti Chandrakar (2017)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.3390/s16060837
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
Y. Lu (2016)
10.1016/j.comcom.2011.09.003
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network
W. Li (2012)
10.1109/TWC.2015.2473165
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
10.1016/j.jnca.2010.09.003
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
X. Li (2011)
10.1016/j.future.2016.05.032
A robust and anonymous patient monitoring system using wireless medical sensor networks
R. Amin (2018)
10.1007/s00530-015-0476-3
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
F. Wu (2015)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1016/j.jnca.2011.11.009
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
X. Li (2012)
10.1007/S13369-016-2341-X
Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment
Preeti Chandrakar (2017)
10.1002/sec.1214
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
X. Li (2016)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1016/j.jisa.2015.01.001
An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
Vanga Odelu (2015)
10.1007/s12652-016-0345-8
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
F. Wu (2017)
10.1016/j.jnca.2013.02.034
An enhanced smart card based remote user password authentication scheme
X. Li (2013)
10.3390/s140406443
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
Jiye Kim (2014)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1002/ett.3200
Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment
Preeti Chandrakar (2017)
10.1016/j.future.2016.11.024
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks
P. Vijayakumar (2018)
10.1016/j.adhoc.2015.05.020
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
R. Amin (2016)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1016/j.adhoc.2014.03.009
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
10.1016/j.future.2016.04.016
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S. Kumari (2016)



This paper is referenced by
10.1109/ACCESS.2020.2979906
A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
Shuailiang Zhang (2020)
10.1109/ACCESS.2019.2941701
Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things
Swapnil Paliwal (2019)
10.1007/s11277-020-07769-2
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
Suman Majumder (2020)
Senzorski moduli NFC in varnost podatkov
Dean Crnigoj (2018)
10.3390/agriculture10030089
Wireless Sensor Network Synchronization for Precision Agriculture Applications
A. Zervopoulos (2020)
10.1016/j.jisa.2019.102443
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
Adesh Kumari (2020)
10.3390/s20072081
An Energy Efficient and Secure IoT-Based WSN Framework: An Application to Smart Agriculture
K. Haseeb (2020)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1007/978-3-030-03192-3_8
A Light-Weight Tightening Authentication Scheme for the Objects' Encounters in the Meetings
K. Tran (2018)
10.3233/jifs-179503
RSSI Estimation for wireless sensor network through-the-earth communication at frequency 433 MHz
Xiaoqing Yu (2020)
10.1007/s11277-020-07385-0
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
10.1016/j.comcom.2020.06.012
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
Mengxia Shuai (2020)
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
F. Inam (2019)
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Ali Arish (2019)
10.1155/2018/8539674
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
Wenting Li (2018)
10.1109/ICECCT.2019.8869101
A Secure Authentication Protocol for Vehicular Ad-Hoc Networks
Preeti Chandrakar (2019)
10.4018/IJACI.2019010106
A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks
Preeti Chandrakar (2019)
10.1109/ICEET48479.2020.9048218
A Novel Remote User Authentication Scheme by using Private Blockchain-Based Secure Access Control for Agriculture Monitoring
Jehangir Arshad (2020)
10.1109/TII.2019.2963328
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang (2020)
A Level Dependent Authentication for IoT Paradigm
C. Patel (2020)
10.1109/CITS49457.2020.9232633
A Secure Authentication Mechanism for Wireless Sensor Networks
R. Ali (2020)
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
10.5455/jjcit.71-1563658722
THE IMPACT OF MOBILITY MODELS ON THE PERFORMANCE OF AUTHENTICATION SERVICES IN WIRELESS SENSOR NETWORKS
Iman Almomani (2020)
10.1109/JSYST.2019.2899580
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems
X. Li (2020)
10.1109/ACCESS.2019.2930542
A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map
Feifei Wang (2019)
10.1016/j.adhoc.2017.12.006
Key establishment scheme for wireless sensor networks based on polynomial and random key predistribution scheme
Jianmin Zhang (2018)
10.1002/dac.3484
An efficient three factor-based authentication scheme in multiserver environment using ECC
R. Ali (2018)
10.1111/coin.12330
A two-level authentication scheme for clone node detection in smart cities using Internet of things
A. Shanmugam (2020)
10.1109/ICECCT.2019.8869401
Cryptanalysis and Improvement of a Secure Mutual Authentication Scheme for Remote Users
Preeti Chandrakar (2019)
10.3390/agriengineering2010011
Latency-Adjustable Cloud/Fog Computing Architecture for Time-Sensitive Environmental Monitoring in Olive Groves
A. Tsipis (2020)
10.3390/s20010165
Information-Aware Secure Routing in Wireless Sensor Networks
Q. Shi (2020)
10.1016/j.cmpb.2019.105054
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system
P. Soni (2019)
See more
Semantic Scholar Logo Some data provided by SemanticScholar