scispace - formally typeset
Journal ArticleDOI

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

Tien-Ho Chen, +1 more
- 06 Oct 2010 - 
- Vol. 32, Iss: 5, pp 704-712
TLDR
This paper provides a secrecy improvement over Das' protocol to ensure that a legal user can exercise a WSN in an insecure environment and the proposed protocol is shown to be suitable for higher security WSNs.
Abstract
Authentication is an important service in wireless sensor networks (WSNs) for an unattended environment. Recently, Das proposed a hash-based authentication protocol for WSNs, which provides more security against the masquerade, stolen-verifier, replay, and guessing attacks and avoids the threat which comes with having many logged-in users with the same login-id. In this paper, we point out one security weakness of Das' protocol in mutual authentication for WSN's preservation between users, gateway-node, and sensor nodes. To remedy the problem, this paper provides a secrecy improvement over Das' protocol to ensure that a legal user can exercise a WSN in an insecure environment. Furthermore, by presenting the comparisons of security, computation and communication costs, and performances with the related protocols, the proposed protocol is shown to be suitable for higher security WSNs.

read more

Citations
More filters
Journal ArticleDOI

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

TL;DR: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks is proposed, which ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user.
Journal ArticleDOI

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

TL;DR: This paper focuses on overcoming the security weaknesses of Turkanovic et?al.'s scheme, by proposing a new and improved UAKAS which enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKas.
Journal ArticleDOI

A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

TL;DR: According to the analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements and is shown to be suitable for higher security WSNs.
Journal ArticleDOI

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

TL;DR: This work found that Turkanovic et al.'s smart card-based authentication scheme is vulnerable to impersonation attack with node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy.
Journal ArticleDOI

A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks

TL;DR: A temporal-credential-based mutual authentication scheme among the user, GWN and the sensor node and a lightweight key agreement scheme is proposed to embed into the protocol that is realistic and well adapted for resource-constrained wireless sensor networks.
References
More filters
Journal ArticleDOI

A survey on sensor networks

TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Proceedings ArticleDOI

TinyPK: securing sensor networks with public key technology

TL;DR: The design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks are described.
Journal ArticleDOI

Two-factor user authentication in wireless sensor networks

TL;DR: This letter presents a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
Related Papers (5)