scispace - formally typeset
Open AccessJournal ArticleDOI

An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks

Muhamed Turkanović, +1 more
- 19 Apr 2013 - 
- Vol. 19, Iss: 6, pp 109-116
Reads0
Chats0
TLDR
This paper presents a flaw in Das et al.
Abstract
User authentication is an important issue in wireless sensor networks (WSN). Das et al. recently proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks (HWSN), which provides high security and a simple authentication approach. In this paper we present a flaw in Das et al.’s scheme that makes it infeasible for real-life implementation. Additionally, we demonstrate that Das et al.’s scheme has redundant elements. To overcome these imperfections we propose an enhanced user authentication scheme based on Das et al.’s, which is both efficient and secure. DOI: http://dx.doi.org/10.5755/j01.eee.19.6.2038

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

TL;DR: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks is proposed, which ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user.
Journal ArticleDOI

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

TL;DR: This paper focuses on overcoming the security weaknesses of Turkanovic et?al.'s scheme, by proposing a new and improved UAKAS which enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKas.
Journal ArticleDOI

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

TL;DR: This work found that Turkanovic et al.'s smart card-based authentication scheme is vulnerable to impersonation attack with node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy.
Journal ArticleDOI

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks

TL;DR: The proposed protocol not only resists the above mentioned security weaknesses, but also achieves complete security requirements including specially energy efficiency, user anonymity, mutual authentication and user-friendly password change phase.
Journal ArticleDOI

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

TL;DR: The main intention of this paper is to design an efficient and robust smartcard-based user authentication and session key agreement protocol for wireless sensor networks that use the Internet of Things, and its security is analyzed, proving that it overcomes the weaknesses of Farash et?al.'s protocol.
References
More filters
Journal ArticleDOI

Wireless sensor networks: a survey

TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Wireless sensor network survey

TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Related Papers (5)