Online citations, reference lists, and bibliographies.
← Back to Search

A Temporal-credential-based Mutual Authentication And Key Agreement Scheme For Wireless Sensor Networks

K. Xue, Changsha Ma, P. Hong, R. Ding
Published 2013 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Wireless sensor network (WSN) can be deployed in any unattended environment. With the new developed IoT (Internet of Things) technology, remote authorized users are allowed to access reliable sensor nodes to obtain data and even are allowed to send commands to the nodes in the WSN. Because of the resource constrained nature of sensor nodes, it is important to design a secure, effective and lightweight authentication and key agreement scheme. The gateway node (GWN) plays a crucial role in the WSN as all data transmitted to the outside network must pass through it. We propose a temporal-credential-based mutual authentication scheme among the user, GWN and the sensor node. With the help of the password-based authentication, GWN can issue a temporal credential to each user and sensor node. For a user, his/her temporal credential can be securely protected and stored openly in a smart card. For a sensor node, its temporal credential is related to its identity and must privately stored in its storage medium. Furthermore, with the help of GWN, a lightweight key agreement scheme is proposed to embed into our protocol. The protocol only needs hash and XOR computations. The results of security and performance analysis demonstrate that the proposed scheme provides relatively more security features and high security level without increasing too much overhead of communication, computation and storage. It is realistic and well adapted for resource-constrained wireless sensor networks.
This paper references
The Transport Layer Security (TLS) Protocol Version 1.1
T. Dierks (2006)
A secured authentication protocol
HL Yeh (2009)
An improved smart card based password authentication scheme with provable security
J. Xu (2009)
Advanced smart card based password authentication protocol
R. Song (2010)
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
An enhanced two-factor user authentication in wireless sensor networks
J. Yuan (2014)
New directions in cryptography
W. Diffie (1976)
The Transport Layer Security (TLS) Protocol Version 1.2
T. Dierks (2008)
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
New direction in cryptography
W Diffie (1976)
A dynamic user authentication scheme
KHM Wong (2010)
An improved smart card based password authentication scheme with provable security
Xujing (2009)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)

This paper is referenced by
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
Tian-Fu Lee (2015)
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
S. Kumari (2016)
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition
A. Maurya (2017)
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
A. Ghani (2019)
Passive Incidental Alertness—Based Link Visualization for Secure Data Transmission in Manet
S. Uma (2017)
Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing
Y. Shi (2019)
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
I. Chang (2015)
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
Seyed Farhad Aghili (2018)
An improved hybrid scheme for e-payment security using elliptic curve cryptography
O. M. Lawal (2020)
A three-factor anonymous user authentication scheme for Internet of Things environments
Hakjun Lee (2020)
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
A. K. Das (2017)
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
Jihyeon Ryu (2018)
A user authentication protocol combined with trust model, biometrics and ECC for wireless sensor networks
Tao Liu (2018)
A Novel Authentication Scheme Against Node Captured Attack in WSN for Healthcare Scene
Sheng-Kai Yang (2019)
Multi-factor user authentication scheme for IoT-based healthcare services
P. Dhillon (2018)
Cryptanalysis and improvement of mutual authentication protocol for real-time data access in industrial wireless sensor networks
Devender Kumar (2020)
Secure multi-factor remote user authentication scheme for Internet of Things environments
P. Dhillon (2017)
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
Performance analysis of Authentication Information exchange Scheme in WSN
Sheng-Kai Yang (2019)
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang (2020)
Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
Chang Xu (2020)
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
M. Wazid (2016)
Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter
A. Maurya (2017)
A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things
Hamza Khemissa (2016)
User Authentication for Hiererchical Wireless Sensor Networks
Minsu Park (2013)
Enhanced User Authentication Scheme for Wireless Sensor Networks
Hee-Joo Park (2015)
Three-Factor User Authentication Scheme for WSN
Mercy Jeba Malar (2019)
An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks
A. K. Das (2015)
Epidemiological approach for data survivability in unattended wireless sensor networks
J. Bahi (2014)
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Qi Jiang (2016)
An Improved User Authentication Protocol for Hierarchical Wireless Sensor Networks using Elliptic Curve Cryptography
R. Maharana (2013)
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
H. Yazdanpanah (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar