skip to main content
10.1145/1641944.1641962acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
poster

Robust dynamic user authentication scheme for wireless sensor networks

Authors Info & Claims
Published:28 October 2009Publication History

ABSTRACT

In recent years, wireless sensor networks (WSNs) have been widely used in different domains. For instance, WSNs can be deployed in insecure and unattended environments. In this regard, user authentication is a critical issue for WSNs. In this paper, we propose a user authentication protocol in WSNs, which is variation of strong-password based solution proposed by Wong et al. The proposed protocol is evaluated and compared with the previous schemes.

References

  1. Benenson, Z., Gedicke, N., and Raivio, O. 2005. Realizing Robust User Authentication in Sensor Networks. In Proceedings of Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Sweden, June 2005.Google ScholarGoogle Scholar
  2. Wong, K. H. M., Zheng, Y., Cao J., and Wang, S. 2006. A dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06) Jun. 2006; 1: 318--327. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Jiang, C., Li, B., and Xu, H. 2007. An Efficient Scheme for User Authentication in Wireless Sensor Networks. In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Tseng, H. R., Jan, R. H., and Yang, W. 2007. An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM'07), Nov. 2007; 986--990.Google ScholarGoogle Scholar
  5. Das, M. L., Saxena, A., and Gulati, V. P. 2004. A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics, May 2004; 50(2):629--631. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yoon, E. J., Ryu, E. K., and Yoo, K. Y. 2005. An improvement of Hwang Lee Tang's simple remote user authentication scheme. Elsevier Computers&Security, Feb. 2005; 24(1):50--56.Google ScholarGoogle Scholar
  7. Wang, Y. Y., Liu, J. Y., Xiao, F. X., and Dan, J. 2009. A more efficient and secure dynamic ID-based remote user authentication scheme. Elsevier Computer Communications, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Robust dynamic user authentication scheme for wireless sensor networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          Q2SWinet '09: Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
          October 2009
          120 pages
          ISBN:9781605586199
          DOI:10.1145/1641944

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 October 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          Overall Acceptance Rate46of131submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader