Online citations, reference lists, and bibliographies.
← Back to Search

A Temporal-credential-based Mutual Authentication And Key Agreement Scheme For Wireless Sensor Networks

K. Xue, Changsha Ma, P. Hong, R. Ding
Published 2013 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Wireless sensor network (WSN) can be deployed in any unattended environment. With the new developed IoT (Internet of Things) technology, remote authorized users are allowed to access reliable sensor nodes to obtain data and even are allowed to send commands to the nodes in the WSN. Because of the resource constrained nature of sensor nodes, it is important to design a secure, effective and lightweight authentication and key agreement scheme. The gateway node (GWN) plays a crucial role in the WSN as all data transmitted to the outside network must pass through it. We propose a temporal-credential-based mutual authentication scheme among the user, GWN and the sensor node. With the help of the password-based authentication, GWN can issue a temporal credential to each user and sensor node. For a user, his/her temporal credential can be securely protected and stored openly in a smart card. For a sensor node, its temporal credential is related to its identity and must privately stored in its storage medium. Furthermore, with the help of GWN, a lightweight key agreement scheme is proposed to embed into our protocol. The protocol only needs hash and XOR computations. The results of security and performance analysis demonstrate that the proposed scheme provides relatively more security features and high security level without increasing too much overhead of communication, computation and storage. It is realistic and well adapted for resource-constrained wireless sensor networks.
This paper references
10.17487/RFC4346
The Transport Layer Security (TLS) Protocol Version 1.1
T. Dierks (2006)
A secured authentication protocol
HL Yeh (2009)
10.1016/j.csi.2008.09.006
An improved smart card based password authentication scheme with provable security
J. Xu (2009)
10.1016/j.csi.2010.03.008
Advanced smart card based password authentication protocol
R. Song (2010)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1007/s11235-013-9755-5
An enhanced two-factor user authentication in wireless sensor networks
J. Yuan (2014)
10.1109/TIT.1976.1055638
New directions in cryptography
W. Diffie (1976)
10.17487/rfc8446
The Transport Layer Security (TLS) Protocol Version 1.2
T. Dierks (2008)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
New direction in cryptography
W Diffie (1976)
A dynamic user authentication scheme
KHM Wong (2010)
An improved smart card based password authentication scheme with provable security
Xujing (2009)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)



This paper is referenced by
10.3390/s150714960
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
Tian-Fu Lee (2015)
10.1016/j.comnet.2016.05.007
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
S. Kumari (2016)
10.1007/978-981-10-6898-0_4
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition
A. Maurya (2017)
10.1002/dac.4139
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
A. Ghani (2019)
10.1080/19361610.2017.1277891
Passive Incidental Alertness—Based Link Visualization for Secure Data Transmission in Manet
S. Uma (2017)
10.1109/JSYST.2018.2881711
Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing
Y. Shi (2019)
10.3390/s151229767
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
I. Chang (2015)
10.3390/s18113663
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
Seyed Farhad Aghili (2018)
10.1007/s41870-020-00517-6
An improved hybrid scheme for e-payment security using elliptic curve cryptography
O. M. Lawal (2020)
10.1016/j.jisa.2020.102494
A three-factor anonymous user authentication scheme for Internet of Things environments
Hakjun Lee (2020)
10.1002/dac.2933
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
A. K. Das (2017)
10.3390/s18124481
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
Jihyeon Ryu (2018)
10.31209/2018.100000019
A user authentication protocol combined with trust model, biometrics and ECC for wireless sensor networks
Tao Liu (2018)
10.1109/ECBIOS.2019.8807841
A Novel Authentication Scheme Against Node Captured Attack in WSN for Healthcare Scene
Sheng-Kai Yang (2019)
10.1007/s40860-018-0062-5
Multi-factor user authentication scheme for IoT-based healthcare services
P. Dhillon (2018)
10.1080/1206212X.2020.1825159
Cryptanalysis and improvement of mutual authentication protocol for real-time data access in industrial wireless sensor networks
Devender Kumar (2020)
10.1002/dac.3323
Secure multi-factor remote user authentication scheme for Internet of Things environments
P. Dhillon (2017)
10.1016/j.future.2017.08.042
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
10.1109/ICEA.2019.8858313
Performance analysis of Authentication Information exchange Scheme in WSN
Sheng-Kai Yang (2019)
10.1109/TII.2019.2963328
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang (2020)
10.1016/j.future.2020.04.021
Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
Chang Xu (2020)
10.1002/sec.1452
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
M. Wazid (2016)
10.1109/CIC.2017.00032
Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter
A. Maurya (2017)
10.1109/WTS.2016.7482039
A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things
Hamza Khemissa (2016)
10.1109/SNPD.2013.117
User Authentication for Hiererchical Wireless Sensor Networks
Minsu Park (2013)
10.14257/IJSIA.2015.9.8.32
Enhanced User Authentication Scheme for Wireless Sensor Networks
Hee-Joo Park (2015)
Three-Factor User Authentication Scheme for WSN
Mercy Jeba Malar (2019)
10.1504/IJCNDS.2015.070286
An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks
A. K. Das (2015)
10.1016/j.jnca.2014.09.011
Epidemiological approach for data survivability in unattended wireless sensor networks
J. Bahi (2014)
10.1016/j.jnca.2016.10.001
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Qi Jiang (2016)
An Improved User Authentication Protocol for Hierarchical Wireless Sensor Networks using Elliptic Curve Cryptography
R. Maharana (2013)
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
H. Yazdanpanah (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar