Online citations, reference lists, and bibliographies.
← Back to Search

A Realistic Lightweight Anonymous Authentication Protocol For Securing Real-Time Application Data Access In Wireless Sensor Networks

Prosanta Gope, Tzonelih Hwang
Published 2016 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environment is a paramount security concern. Until now, impressive efforts have been made for designing authentication schemes with user anonymity by using only the lightweight cryptographic primitives, such as symmetric key encryption/decryption and hash functions. However, to the best of our knowledge, none has succeeded so far. In this paper, we take an initial step to shed light on the rationale underlying this prominent issue. In order to do that here at first, we demonstrate that the existing solutions for anonymous user authentication in WSN are impractical. Subsequently, we propose a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc.
This paper references
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1007/s11277-015-2288-3
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
A. K. Das (2015)
10.1002/dac.2933
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
A. K. Das (2017)
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks
Jiang (2012)
10.1016/j.comnet.2014.07.010
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang (2014)
10.1109/ICECC.2011.6067856
An efficient delegation-based roaming payment protocol against denial of service attacks
C. Wang (2011)
10.1109/MCOM.2002.1024422
A survey on sensor networks
I. Akyildiz (2002)
10.1145/1182807.1182823
The Tenet architecture for tiered sensor networks
O. Gnawali (2006)
Authentication Protocol for Wireless Sensor Networks
S. Gupta (2010)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
A Survey on Sensor Network
Kazi Chandrima Rahman (2010)
10.1007/3-540-46766-1_5
Universal Hashing and Authentication Codes
D. Stinson (1991)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1109/TMC.2011.126
Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Computational Complexity and Efficient Approximations
D. Yang (2012)
10.1109/JSEN.2015.2502401
BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network
Prosanta Gope (2016)
A robust authentication protocol for wireless sensor networks
T. H. Chen (2010)
10.1007/s12083-014-0285-z
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)
10.1631/jzus.C1000377
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong Fan (2011)
10.1109/JSYST.2015.2416396
Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks
Prosanta Gope (2016)
10.1007/s12083-014-0324-9
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
A. K. Das (2016)
An advanced temporal credentialbased security scheme with mutual authentication and key agreement for wireless sensor networks
C. T. Li (2013)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1016/j.jnca.2015.12.003
An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks
Prosanta Gope (2016)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.3390/s110505020
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
P. Kumar (2011)
A secure and efficient user anonymity-preserving threefactor authentication protocol for large-scale distributed wireless sensor networks
A. K. Das (2015)
10.1109/JSEN.2015.2441113
Untraceable Sensor Movement in Distributed IoT Infrastructure
Prosanta Gope (2015)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
A dynamic ID-based authentication scheme
Tien-Dung Nguyen (2010)
10.1007/springerreference_213
Differential Power Analysis
Siva Sai Yerubandi (2002)
10.1007/BF00124891
Authentication and authenticated key exchanges
W. Diffie (1992)
10.1016/j.cose.2015.05.004
A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
Prosanta Gope (2015)



This paper is referenced by
10.1007/S11276-018-1841-X
Lightweight three factor scheme for real-time data access in wireless sensor networks
Hanguang Luo (2020)
10.22266/IJIES2017.0430.19
Base Station Positioning in Wireless Sensor Network to aid Cluster Head Selection Process
A. Shankar (2017)
10.1109/IECON.2018.8591451
Lightweight and Low-Energy Encryption Scheme for Voice over Wireless Devices
Firas Hazzaa (2018)
10.1109/ACCESS.2019.2910859
Implementation of Encryption Algorithm and Wireless Image Transmission System on FPGA
Cheng-Hsiung Yang (2019)
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
S. Rostampour (2016)
10.1109/CINE48825.2020.234395
A brief overview of User Authentication in Internet of Things architecture
S. Banerjee (2020)
An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
Haowen Tan (2018)
10.1007/978-3-030-37051-0_17
A Novel Security Scheme of Temporal-Key Based Encryption Policy in Sensor Applications
M. N. Premakumar (2020)
10.1109/ACCESS.2019.2941575
An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT
B. D. Deebak (2019)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1109/ACCESS.2019.2941701
Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things
Swapnil Paliwal (2019)
10.1145/3341325.3342039
User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT
M. Ak̲h̲tar (2019)
10.1002/dac.4139
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
A. Ghani (2019)
10.1016/j.comnet.2018.11.021
A lightweight anonymous user authentication and key establishment scheme for wearable devices
Ankur Gupta (2019)
10.1007/s11277-020-07385-0
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
10.1145/3288599.3295577
End to end secure anonymous communication for secure directed diffusion in IoT
J. Sengupta (2019)
10.1109/TII.2019.2895030
Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
Prosanta Gope (2019)
10.1016/j.compeleceng.2017.03.008
Lightweight authentication protocols for wearable devices
A. K. Das (2017)
10.1007/s12652-018-0712-8
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
Devender Kumar (2019)
10.1016/J.COMNET.2019.04.031
Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications
Amel Arfaoui (2019)
10.1007/978-3-030-15145-4_37-1
Technology: Person Identification
Igor Bezukladnikov (2020)
10.1109/JSEN.2016.2628413
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
Prosanta Gope (2017)
10.1155/2017/6562953
Authentication Protocols for Internet of Things: A Comprehensive Survey
M. Ferrag (2017)
10.1016/j.eij.2020.02.005
AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment
S. Nashwan (2020)
10.1016/j.future.2019.12.028
Securing internet of medical things systems: Limitations, issues and recommendations
Jean-Paul A. Yaacoub (2020)
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
10.1016/J.SYSARC.2018.12.005
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
M. Wazid (2019)
10.1109/I2C2.2017.8321898
Issues in IoT healthcare platforms: A critical study and review
S. Sonune (2017)
10.1109/ACCESS.2019.2942987
Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based ID-MAKA Scheme for Mobile Cloud Computing Services
W. Liu (2019)
10.1016/j.comnet.2020.107333
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
Mahdi Fotouhi (2020)
10.1109/JBHI.2018.2870319
Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System
R. Amin (2019)
10.1109/ACCESS.2020.2980739
A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data
Mohammad Ayoub Khan (2020)
See more
Semantic Scholar Logo Some data provided by SemanticScholar