Online citations, reference lists, and bibliographies.
← Back to Search

A Robust Mutual Authentication Protocol For Wireless Sensor Networks

Tien-Ho Chen, W. Shih
Published 2010 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Authentication is an important service in wireless sensor networks (WSNs) for an unattended environment. Recently, Das proposed a hash-based authentication protocol for WSNs, which provides more security against the masquerade, stolen-verifier, replay, and guessing attacks and avoids the threat which comes with having many logged-in users with the same login-id. In this paper, we point out one security weakness of Das' protocol in mutual authentication for WSN's preservation between users, gateway-node, and sensor nodes. To remedy the problem, this paper provides a secrecy improvement over Das' protocol to ensure that a legal user can exercise a WSN in an insecure environment. Furthermore, by presenting the comparisons of security, computation and communication costs, and performances with the related protocols, the proposed protocol is shown to be suitable for higher security WSNs.
This paper references
10.1016/j.future.2010.08.007
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Tien-Ho Chen (2011)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1145/1023646.1023654
Security considerations for IEEE 802.15.4 networks
Naveen Sastry (2004)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.1016/j.comcom.2007.10.025
Defense against outside attacks in wireless sensor networks
Somanath Tripathy (2008)
10.1016/j.csi.2008.11.002
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
H. Hsiang (2009)
10.1007/springerreference_213
Differential Power Analysis
Siva Sai Yerubandi (2002)
IEEE Standards for 802 . 15 . 4 , Part 15 , Amendment 4 , “ Wireless Medium Access Control and Physical Layer Specifications for Low - Rate Wireless Personal Area Networks
D. Wagner (2003)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1016/j.jcss.2008.04.002
Two-factor mutual authentication based on smart cards and passwords
G. Yang (2008)
10.1145/288090.288118
Public-key cryptography and password protocols
S. Halevi (1998)
10.1109/ICCIAS.2006.295440
Security Improvement On Chien Et Al.'s Remote User Authentication Scheme Using Smart Cards
Xiaoyi Duan (2006)
10.1109/GLOCOM.2007.190
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
Huei-Ru Tseng (2007)
Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks
IEEE Standards for 802.15.4 (2003)
10.1016/j.comcom.2008.11.019
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
H. Hsiang (2009)
10.1109/MCOM.2002.1024422
A survey on sensor networks
I. Akyildiz (2002)
10.1145/1029102.1029113
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
10.1016/S0167-4048(02)00415-7
An Efficient and Practical Solution to Remote Authentication: Smart Card
H. Chien (2002)
10.1109/WCSN.2009.5434810
Improved robust user authentication scheme for wireless sensor networks
B. Vaidya (2009)



This paper is referenced by
10.1371/journal.pone.0116709
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
Junghyun Nam (2015)
10.3390/s19081909
Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks
Hisham N. Almajed (2019)
10.1155/2014/759132
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
J. Kim (2014)
10.1007/s11277-016-3281-1
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
C. Chang (2016)
Enhancement the security of WSN using ALARM protocol to Prevention from Reply Attack
Neelam Shekhawat (2014)
10.15680/IJIRSET.2014.0312042
Review of Isolate and Prevent Selective PacketDrop Attack in MANET
SagarPatolia (2014)
10.1007/s10916-017-0720-9
A Mutual Authentication Framework for Wireless Medical Sensor Networks
J. Srinivas (2017)
10.1007/s11277-015-2288-3
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
A. K. Das (2015)
Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Apurva J. Shastri (2017)
10.1002/dac.4139
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
A. Ghani (2019)
10.1007/978-3-030-05081-8_20
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
C. Li (2018)
10.25125/ENGINEERING-JOURNAL-IJOER-JUN-2017-5
ECC-based User Authentication Scheme for Wireless Sensor Networks
Imanbaev Temirlan (2017)
10.1002/dac.4511
A lightweight anonymous two-factor authentication protocol for wireless sensor networks in Internet of Vehicles
Mohammad Javad Sadri (2020)
10.2991/MEITA-15.2015.113
Cryptanalysis of Vaidya et al.’s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
J. Li (2015)
10.1007/s11265-017-1305-z
Breaking Three Remote user Authentication Systems for Mobile Devices
Wenting Li (2017)
On the Security of 'An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'
A. K. Das (2014)
10.1007/978-981-10-7635-0_9
Lightweight Anonymity-Preserving Authentication and Key Agreement Protocol for the Internet of Things Environment
Ahmed Mohammed Ibrahim Alkuhlani (2017)
10.14257/IJSIA.2015.9.8.32
Enhanced User Authentication Scheme for Wireless Sensor Networks
Hee-Joo Park (2015)
10.1002/9781119527978.ch9
WebMaDa 2.1 – A Web‐Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel
C. Schmitt (2020)
10.1007/978-3-030-00021-9_4
Security Solution for Real-Time Data Access in Wireless Sensor Networks
Hanguang Luo (2018)
10.1007/978-3-319-68542-7_17
An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network
X. Zhang (2017)
10.1109/WAINA.2013.22
A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks
A. K. Das (2013)
10.1007/S11277-020-07811-3
Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
A. Jabbari (2020)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1016/j.adhoc.2015.05.014
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
10.1109/ICRITO.2014.7014731
Reliable data transmission in Anonymous Location Aided Routing in MANET by preventing replay attack
Monika Khatkar (2014)
10.1016/j.adhoc.2015.05.020
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
R. Amin (2016)
Secure true random number generator in a distributed system via wireless LAN (Distributed-RNG protocol)
Hooman Alavizadeh (2013)
10.3390/s17050940
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks
Jongho Moon (2017)
Cryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks
Haewon Choi (2017)
10.1145/3376044.3376045
High-speed Railway Environmental Monitoring Data Identity Authentication Scheme Based on Consortium Blockchain
Lihua Zhang (2019)
10.2991/ICWCSN-16.2017.135
Cryptanalysis of an Untraceable Temporal-Credential-Based Two-Factor Authentication Scheme Using ECC for Wireless Sensor Networks
Shu-ying Yang (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar