ABSTRACT
In recent years, wireless sensor networks (WSNs) have been widely used in different domains. For instance, WSNs can be deployed in insecure and unattended environments. In this regard, user authentication is a critical issue for WSNs. In this paper, we propose a user authentication protocol in WSNs, which is variation of strong-password based solution proposed by Wong et al. The proposed protocol is evaluated and compared with the previous schemes.
- Benenson, Z., Gedicke, N., and Raivio, O. 2005. Realizing Robust User Authentication in Sensor Networks. In Proceedings of Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Sweden, June 2005.Google Scholar
- Wong, K. H. M., Zheng, Y., Cao J., and Wang, S. 2006. A dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06) Jun. 2006; 1: 318--327. Google ScholarDigital Library
- Jiang, C., Li, B., and Xu, H. 2007. An Efficient Scheme for User Authentication in Wireless Sensor Networks. In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007. Google ScholarDigital Library
- Tseng, H. R., Jan, R. H., and Yang, W. 2007. An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM'07), Nov. 2007; 986--990.Google Scholar
- Das, M. L., Saxena, A., and Gulati, V. P. 2004. A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics, May 2004; 50(2):629--631. Google ScholarDigital Library
- Yoon, E. J., Ryu, E. K., and Yoo, K. Y. 2005. An improvement of Hwang Lee Tang's simple remote user authentication scheme. Elsevier Computers&Security, Feb. 2005; 24(1):50--56.Google Scholar
- Wang, Y. Y., Liu, J. Y., Xiao, F. X., and Dan, J. 2009. A more efficient and secure dynamic ID-based remote user authentication scheme. Elsevier Computer Communications, 2009. Google ScholarDigital Library
Index Terms
- Robust dynamic user authentication scheme for wireless sensor networks
Recommendations
User Authentication for Hiererchical Wireless Sensor Networks
SNPD '13: Proceedings of the 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed ComputingWireless sensor networks (WSNs) have a vast field of applications, including environment monitoring, battlefield surveillance and target tracking systems. As WSNs are usually deployed in remote or hostile environments and nodes are prone to compromise ...
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Most queries in wireless sensor network (WSN) applications are issued at the point of the base station or gateway node of the network. However, for critical applications of WSNs there is a great need to access the real-time data inside the WSN from the ...
An efficient and lightweight user authentication scheme for wireless sensor networks
ICICA'11: Proceedings of the Second international conference on Information Computing and ApplicationsAs wireless sensor networks(WSNs) are susceptible to attacks and sensor nodes have limited resources, it is necessary to design a secure and lightweight user authentication protocol for WSNs. Over the past few years, a few user authentication schemes ...
Comments