Online citations, reference lists, and bibliographies.
← Back to Search

A Secured Authentication Protocol For Wireless Sensor Networks Using Elliptic Curves Cryptography

Hsiu-lien Yeh, Tien-Ho Chen, Pin-Chuan Liu, Tai-Hoo Kim, H. Wei
Published 2011 · Computer Science, Medicine

Cite This
Download PDF
Analyze on Scholarcy
Share
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
This paper references
10.1201/9781439821916
Handbook of Applied Cryptography
A. Menezes (1996)
10.1145/1029102.1029113
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
10.1145/990680.990704
Habitat monitoring with sensor networks
Robert Szewczyk (2004)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.1007/978-3-642-13577-4_5
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'
M. Khan (2010)
10.1090/S0025-5718-1987-0866109-5
Elliptic curve cryptosystems
N. Koblitz (1987)
10.1109/TCE.2004.1309441
A dynamic ID-based remote user authentication scheme
M. Das (2004)
Clock Synchronization for Wireless Sensor Network: A Survey. Ad-Hoc Networks
B Sundararaman (2005)
IEEE Standards for 802.15.4, Part 15, Amendment 4. Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks
(2003)
The use of elliptic curves in cryptography
Tibor Juhas (2007)
10.1016/j.adhoc.2005.01.002
Clock synchronization for wireless sensor networks: a survey
Bharath Sundararaman (2005)
10.1109/TCE.2003.1261224
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung (2003)
Wireless Sensor Network Survey. Comput. Network
J Yick (2008)
10.1007/978-0-387-35973-1_358
Environmental Sensor Networks
S. Shekhar (2008)
10.1201/9780203500705
Wireless Sensor Networks: Architectures and Protocols
J. Callaway (2003)
10.1007/3-540-39799-X
Advances in Cryptology — CRYPTO ’85 Proceedings
H. Williams (2000)
10.1109/GLOCOM.2007.190
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
Huei-Ru Tseng (2007)
Wireless Sensor Network -A Survey
N. Chouhan (2013)
10.1109/MCOM.2002.1024422
A survey on sensor networks
I. Akyildiz (2002)
Amendment 4. Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks
(2003)
Estrin, D. Habitat Monitoring with Sensor Networks
R Szewezyk (2004)
10.1145/1023646.1023654
Security considerations for IEEE 802.15.4 networks
Naveen Sastry (2004)
Wireless Sensor Networks, Architectures and Protocols; Auerbach Publications
E. H. Callaway (2003)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)



This paper is referenced by
10.1016/j.jisa.2014.10.008
Advanced password based authentication scheme for wireless sensor networks
S. Kalra (2015)
10.1155/2020/8818704
Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems
Hui Zhang (2020)
10.1080/03091902.2019.1707890
Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system
Philemon Kasyoka (2020)
10.1016/J.FUTURE.2019.04.019
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
Arezou Ostad-Sharif (2019)
10.1049/iet-ifs.2011.0348
Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data
Hsiu-lien Yeh (2013)
10.1155/2013/716265
A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks
Y. Li (2013)
10.1007/s11277-016-3281-1
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
C. Chang (2016)
10.1007/978-981-13-2622-6_5
Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks
Jihyeon Ryu (2019)
10.1007/S00500-018-3226-6
An novel anonymous user WSN authentication for Internet of Things
X. Zhang (2019)
10.3390/s141121023
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Junghyun Nam (2014)
10.1109/IOTA.2016.7562742
Energy efficient integrated authentication and access control mechanisms for Internet of Things
S. Patel (2016)
10.3390/jsan3030224
Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks
I. Mansour (2014)
10.1155/2018/2484268
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
Ke Zhang (2018)
10.1109/ISWPC.2013.6707446
A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
D. He (2013)
Sybil Attack Prevention in WSN Using Elliptic Curve Cryptography and Genetic Algorithm
Omar Badeea Baban (2017)
10.1007/978-981-10-0281-6_2
Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks
Younsung Choi (2015)
10.11591/IJECE.V8I1.PP605-610
Cryptanalysis on Privacy-Aware Two-factor Authentication Protocol for Wireless Sensor Networks
Younsung Choi (2018)
WSN Integrated Authentication Schemes Based on Internet of Things
Tsung-Hung Lin (2018)
10.1109/ICCIC.2014.7238435
Trust based secure routing protocol using fuzzy logic in wireless sensor networks
S. Renubala (2014)
10.3390/APP7101069
Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT
Z. Mahmood (2017)
10.1002/eng2.12176
Multi‐user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography
Philemon Kasyoka (2020)
10.1371/JOURNAL.PONE.0234631
Correction: Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
Chi-Tung Chen (2020)
10.1007/S11277-019-06252-X
An Enhanced and Secure Biometric Based User Authentication Scheme in Wireless Sensor Networks Using Smart Cards
Subhasish Banerjee (2019)
10.1109/ICCI-CC.2016.7862076
A user authentication protocol combined with trust model and ECC for wireless sensor networks
T. Liu (2016)
10.1109/TII.2017.2773666
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
X. Li (2018)
10.5815/IJCNIS.2019.01.05
A Critical appraisal on Password based Authentication
Amanpreet Kaur (2019)
10.1155/2019/5747136
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices
Sanaz Kavianpour (2019)
10.3390/s111009717
Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree Concepts
Hsiang-Cheh Huang (2011)
10.1109/ACCESS.2019.2944515
Anti-Synchronization and Robust Authentication for Noisy PUF-Based Smart Card
Yuling Chen (2019)
10.1109/CONTROLO.2018.8439736
A Lightweight Cryptographic Scheme with Dynamic Key
Yuxin Wu (2018)
10.1007/s11277-020-07385-0
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
10.12785/AMIS/080416
An efficient authentication and access control scheme for perception layer of Internet of Things
Y. Ning (2014)
See more
Semantic Scholar Logo Some data provided by SemanticScholar