Online citations, reference lists, and bibliographies.
← Back to Search

A Robust Mutual Authentication Protocol For Wireless Sensor Networks

Tien-Ho Chen, W. Shih
Published 2010 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Authentication is an important service in wireless sensor networks (WSNs) for an unattended environment. Recently, Das proposed a hash-based authentication protocol for WSNs, which provides more security against the masquerade, stolen-verifier, replay, and guessing attacks and avoids the threat which comes with having many logged-in users with the same login-id. In this paper, we point out one security weakness of Das' protocol in mutual authentication for WSN's preservation between users, gateway-node, and sensor nodes. To remedy the problem, this paper provides a secrecy improvement over Das' protocol to ensure that a legal user can exercise a WSN in an insecure environment. Furthermore, by presenting the comparisons of security, computation and communication costs, and performances with the related protocols, the proposed protocol is shown to be suitable for higher security WSNs.
This paper references
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Tien-Ho Chen (2011)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
Security considerations for IEEE 802.15.4 networks
Naveen Sastry (2004)
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
Defense against outside attacks in wireless sensor networks
Somanath Tripathy (2008)
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
H. Hsiang (2009)
Differential Power Analysis
Siva Sai Yerubandi (2002)
IEEE Standards for 802 . 15 . 4 , Part 15 , Amendment 4 , “ Wireless Medium Access Control and Physical Layer Specifications for Low - Rate Wireless Personal Area Networks
D. Wagner (2003)
On the security of public key protocols
D. Dolev (1981)
Two-factor mutual authentication based on smart cards and passwords
G. Yang (2008)
Public-key cryptography and password protocols
S. Halevi (1998)
Security Improvement On Chien Et Al.'s Remote User Authentication Scheme Using Smart Cards
Xiaoyi Duan (2006)
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
Huei-Ru Tseng (2007)
Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks
IEEE Standards for 802.15.4 (2003)
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
H. Hsiang (2009)
A survey on sensor networks
I. Akyildiz (2002)
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
An Efficient and Practical Solution to Remote Authentication: Smart Card
H. Chien (2002)
Improved robust user authentication scheme for wireless sensor networks
B. Vaidya (2009)

This paper is referenced by
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
Junghyun Nam (2015)
Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks
Hisham N. Almajed (2019)
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
J. Kim (2014)
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
C. Chang (2016)
Enhancement the security of WSN using ALARM protocol to Prevention from Reply Attack
Neelam Shekhawat (2014)
Review of Isolate and Prevent Selective PacketDrop Attack in MANET
SagarPatolia (2014)
A Mutual Authentication Framework for Wireless Medical Sensor Networks
J. Srinivas (2017)
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
A. K. Das (2015)
Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Apurva J. Shastri (2017)
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
A. Ghani (2019)
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
C. Li (2018)
ECC-based User Authentication Scheme for Wireless Sensor Networks
Imanbaev Temirlan (2017)
A lightweight anonymous two-factor authentication protocol for wireless sensor networks in Internet of Vehicles
Mohammad Javad Sadri (2020)
Cryptanalysis of Vaidya et al.’s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
J. Li (2015)
Breaking Three Remote user Authentication Systems for Mobile Devices
Wenting Li (2017)
On the Security of 'An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'
A. K. Das (2014)
Lightweight Anonymity-Preserving Authentication and Key Agreement Protocol for the Internet of Things Environment
Ahmed Mohammed Ibrahim Alkuhlani (2017)
Enhanced User Authentication Scheme for Wireless Sensor Networks
Hee-Joo Park (2015)
WebMaDa 2.1 – A Web‐Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel
C. Schmitt (2020)
Security Solution for Real-Time Data Access in Wireless Sensor Networks
Hanguang Luo (2018)
An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network
X. Zhang (2017)
A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks
A. K. Das (2013)
Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
A. Jabbari (2020)
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
Reliable data transmission in Anonymous Location Aided Routing in MANET by preventing replay attack
Monika Khatkar (2014)
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
R. Amin (2016)
Secure true random number generator in a distributed system via wireless LAN (Distributed-RNG protocol)
Hooman Alavizadeh (2013)
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks
Jongho Moon (2017)
Cryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks
Haewon Choi (2017)
High-speed Railway Environmental Monitoring Data Identity Authentication Scheme Based on Consortium Blockchain
Lihua Zhang (2019)
Cryptanalysis of an Untraceable Temporal-Credential-Based Two-Factor Authentication Scheme Using ECC for Wireless Sensor Networks
Shu-ying Yang (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar