Online citations, reference lists, and bibliographies.
← Back to Search

A Realistic Lightweight Anonymous Authentication Protocol For Securing Real-Time Application Data Access In Wireless Sensor Networks

Prosanta Gope, Tzonelih Hwang
Published 2016 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environment is a paramount security concern. Until now, impressive efforts have been made for designing authentication schemes with user anonymity by using only the lightweight cryptographic primitives, such as symmetric key encryption/decryption and hash functions. However, to the best of our knowledge, none has succeeded so far. In this paper, we take an initial step to shed light on the rationale underlying this prominent issue. In order to do that here at first, we demonstrate that the existing solutions for anonymous user authentication in WSN are impractical. Subsequently, we propose a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc.
This paper references
On the security of public key protocols
D. Dolev (1981)
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
A. K. Das (2015)
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
A. K. Das (2017)
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks
Jiang (2012)
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang (2014)
An efficient delegation-based roaming payment protocol against denial of service attacks
C. Wang (2011)
A survey on sensor networks
I. Akyildiz (2002)
The Tenet architecture for tiered sensor networks
O. Gnawali (2006)
Authentication Protocol for Wireless Sensor Networks
S. Gupta (2010)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
A Survey on Sensor Network
Kazi Chandrima Rahman (2010)
Universal Hashing and Authentication Codes
D. Stinson (1991)
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Computational Complexity and Efficient Approximations
D. Yang (2012)
BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network
Prosanta Gope (2016)
A robust authentication protocol for wireless sensor networks
T. H. Chen (2010)
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong Fan (2011)
Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks
Prosanta Gope (2016)
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
A. K. Das (2016)
An advanced temporal credentialbased security scheme with mutual authentication and key agreement for wireless sensor networks
C. T. Li (2013)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks
Prosanta Gope (2016)
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
P. Kumar (2011)
A secure and efficient user anonymity-preserving threefactor authentication protocol for large-scale distributed wireless sensor networks
A. K. Das (2015)
Untraceable Sensor Movement in Distributed IoT Infrastructure
Prosanta Gope (2015)
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
A dynamic ID-based authentication scheme
Tien-Dung Nguyen (2010)
Differential Power Analysis
Siva Sai Yerubandi (2002)
Authentication and authenticated key exchanges
W. Diffie (1992)
A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
Prosanta Gope (2015)

This paper is referenced by
Lightweight three factor scheme for real-time data access in wireless sensor networks
Hanguang Luo (2020)
Base Station Positioning in Wireless Sensor Network to aid Cluster Head Selection Process
A. Shankar (2017)
Lightweight and Low-Energy Encryption Scheme for Voice over Wireless Devices
Firas Hazzaa (2018)
Implementation of Encryption Algorithm and Wireless Image Transmission System on FPGA
Cheng-Hsiung Yang (2019)
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
S. Rostampour (2016)
A brief overview of User Authentication in Internet of Things architecture
S. Banerjee (2020)
An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
Haowen Tan (2018)
A Novel Security Scheme of Temporal-Key Based Encryption Policy in Sensor Applications
M. N. Premakumar (2020)
An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT
B. D. Deebak (2019)
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things
Swapnil Paliwal (2019)
User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT
M. Ak̲h̲tar (2019)
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
A. Ghani (2019)
A lightweight anonymous user authentication and key establishment scheme for wearable devices
Ankur Gupta (2019)
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
End to end secure anonymous communication for secure directed diffusion in IoT
J. Sengupta (2019)
Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
Prosanta Gope (2019)
Lightweight authentication protocols for wearable devices
A. K. Das (2017)
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
Devender Kumar (2019)
Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications
Amel Arfaoui (2019)
Technology: Person Identification
Igor Bezukladnikov (2020)
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
Prosanta Gope (2017)
Authentication Protocols for Internet of Things: A Comprehensive Survey
M. Ferrag (2017)
AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment
S. Nashwan (2020)
Securing internet of medical things systems: Limitations, issues and recommendations
Jean-Paul A. Yaacoub (2020)
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
M. Wazid (2019)
Issues in IoT healthcare platforms: A critical study and review
S. Sonune (2017)
Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based ID-MAKA Scheme for Mobile Cloud Computing Services
W. Liu (2019)
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
Mahdi Fotouhi (2020)
Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System
R. Amin (2019)
A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data
Mohammad Ayoub Khan (2020)
See more
Semantic Scholar Logo Some data provided by SemanticScholar