Skip to main content
Log in

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

  • Published:
Journal of Zhejiang University SCIENCE C Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints. Considering that most large-scale WSNs follow a two-tiered architecture, we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs. The proposed approach reduces the computational load, since it performs only simple operations, such as exclusive-OR and a one-way hash function. This feature is more suitable for the resource-limited sensor nodes and mobile devices. And it is unnecessary for master nodes to forward login request messages to the base station, or maintain a long user list. In addition, pseudonym identity is introduced to preserve user anonymity. Through clever design, our proposed scheme can prevent smart card breaches. Finally, security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Awasthi, A., 2004. Comment on a dynamic ID-based remote user authentication scheme. Trans. Cryptol., 1(2):15–17.

    Google Scholar 

  • Awasthi, A., Lal, S., 2004. An enhanced remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron., 50(2):583–586. [doi:10.1109/TCE.2004.1309430]

    Article  Google Scholar 

  • Benenson, Z., Gedicke, N., Raivio, O., 2005. Realizing Robust User Authentication in Sensor Networks. Proc. Workshop on Real-World Wireless Sensor Networks, p.1–5.

  • Chang, C.C., Wu, T.C., 1991. Remote password authentication with smart cards. IEE Proc. E Comput. Digit. Tech., 138(3):165–168. [doi:10.1049/ip-e.1991.0022]

    Article  Google Scholar 

  • Das, M.L., 2009. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun., 8(3):1086–1090. [doi:10.1109/TWC.2008.080128]

    Article  Google Scholar 

  • Das, M.L., Saxena, A., Gulati, V.P., 2004. A dynamic IDbased remote user authentication scheme. IEEE Trans. Consum. Electron., 50(2):629–631. [doi:10.1109/TCE.2004.1309441]

    Article  Google Scholar 

  • Desnoyers, P., Ganesan, D., Shenoy, P., 2005. TSAR: a Two Tier Sensor Storage Architecture Using Interval Skip Graphs. Proc. 3rd Int. Conf. on Embedded Networked Sensor Systems, p.39–50. [doi:10.1145/1098918.1098923]

  • Diao, Y., Ganesan, D., Mathur, G., Shenoy, P.J., 2007. Rethinking Data Management for Storage-Centric Sensor Networks. Proc. Conf. on Innovative Data Systems Research, p.22–31.

  • Dolev, D., Yao, A., 1983. On the security of public key protocols. IEEE Trans. Inform. Theory, 29(2):198–208. [doi:10.1109/TIT.1983.1056650]

    Article  MATH  MathSciNet  Google Scholar 

  • Du, W., Deng, J., Han, Y., Varshney, P., 2003. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Conf. on Computer and Communications Security, p.42–51.

  • Eschenauer, L., Gligor, V.D., 2002. A Key-Management Scheme for Distributed Sensor Networks. Proc. 9th ACM Conf. on Computer and Communications Security, p.41–47. [doi:10.1145/586110.586117]

  • Fan, C.I., Chan, Y.C., Zhang, Z.K., 2005. Robust remote authentication scheme with smart cards. Comput. & Secur., 24(8):619–628. [doi:10.1016/j.cose.2005.03.006]

    Article  Google Scholar 

  • Gnawali, O., Jang, K.Y., Paek, J., Vieira, M., Govindan, R., Greenstein, B., Joki, A., Estrin, D., Kohler, E., 2006. The Tenet Architecture for Tiered Sensor Networks. Proc. 4th Int. Conf. on Embedded Networked Sensor Systems, p.153–166. [doi:10.1145/1182807.1182823]

  • He, D.J., Cui, L., Huang, H., Ma, M., 2009. Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans. Parall. Distr. Syst., 20(7):1050–1058. [doi:10.1109/TPDS.2008.166]

    Article  Google Scholar 

  • He, D.J., Gao, Y., Chan, S., Chen, C., Bu, J.J., 2010. An enhanced two-factor user authentication scheme in wireless sensor networks. Int. J. Ad Hoc Sensor Wirel. Networks, 10(4):361–371.

    Google Scholar 

  • He, D.J., Ma, M., Zhang, Y., Chen, C., Bu, J.J., 2011. A strong user authentication scheme with smart cards for wireless communications. Comput. Commun., 34(3):367–374. [doi:10.1016/j.comcom.2010.02.031]

    Article  Google Scholar 

  • Hsiang, H.C., Shih, W.K., 2009. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces, 31(6):1118–1123. [doi:10.1016/j.csi.2008.11.002]

    Article  Google Scholar 

  • Hwang, M.S., Li, L.H., 2000. A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron., 46(1):28–30. [doi:10.1109/30.826377]

    Article  Google Scholar 

  • Jiang, Y., Lin, C., Shen, X., Shi, M., 2006. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Trans. Wirel. Commun., 5(9):2569–2577. [doi:10.1109/TWC.2006.05063]

    Article  Google Scholar 

  • Lazos, L., Poovendran, R., 2004. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. Proc. 3rd ACM Workshop on Wireless Security, p.21–30. [doi:10.1145/1023646.1023650]

  • Lee, C.C., Hwang, M.S., Liao, I.E., 2006. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron., 53(5):1683–1687. [doi:10.1109/TIE.2006.881998]

    Article  MATH  Google Scholar 

  • Lee, C.Y., Lin, C.H., Chang, C.C., 2005. An Improved Low Communication Cost User Authentication Scheme for Mobile Communication. 19th Int. Conf. on Advanced Information Networking and Applications, p.249–252. [doi:10.1109/AINA.2005.106]

  • Lee, J.S., Chang, J.H., Lee, D.H., 2009. Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun. Lett., 13(5):292–293. [doi:10.1109/LCOMM.2009.090074]

    Article  Google Scholar 

  • Liao, Y.P., Wang, S.S., 2009. A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces, 31(1):24–29. [doi:10.1016/j.csi.2007.10.007]

    Article  Google Scholar 

  • Liu, D., Ning, P., 2003. Establishing Pairwise Keys in Distributed Sensor Networks. ACM Conf. on Computer and Communications Security, p.52–61.

  • Ren, K., Lou, W., Zhang, Y., 2008. LEDS: providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans. Mob. Comput., 7(5):585–598. [doi:10.1109/TMC.2007.70753]

    Article  Google Scholar 

  • Shi, J., Zhang, R., Zhang, Y., 2009. Secure Range Queries in Tiered Sensor Networks. IEEE INFOCOM, p.945–953. [doi:10.1109/INFCOM.2009.5062005]

  • Tsai, J.L., 2008. Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. & Secur., 27(3–4):115–121. [doi:10.1016/j.cose.2008.04.001]

    Article  Google Scholar 

  • Wong, K.H.M., Zheng, Y., Cao, J.N., Wang, S.W., 2006. A Dynamic User Authentication Scheme for Wireless Sensor Networks. IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1:244–251. [doi:10.1109/SUTC.2006.1636182]

    Article  Google Scholar 

  • Wu, C.C., Lee, W.B., Tsaur, W.J., 2008. A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett., 12(10):722–723. [doi:10.1109/LCOMM.2008.080283]

    Article  Google Scholar 

  • Xu, J., Feng, D., 2009. Security flaws in authentication protocols with anonymity for wireless environments. ETRI J., 31(4):460–462. [doi:10.4218/etrij.09.0209.0026]

    Article  Google Scholar 

  • Zeng, P., Cao, Z., Choo, K.K., Wang, S., 2009. On the anonymity of some authentication schemes for wireless communications. IEEE Commun. Lett., 13(3):170–171. [doi:10.1109/LCOMM.2009.081821]

    Article  Google Scholar 

  • Zhang, R., Shi, J., Zhang, Y., 2009. Secure Multidimensional Range Queries in Sensor Networks. Proc. 10th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, p.197–206. [doi:10.1145/1530748.1530777]

  • Zhang, Y., Liu, W., Fang, Y., Wu, D., 2006. Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Sel. Areas Commun., 24(4):829–835. [doi:10.1109/JSAC.2005.863855]

    Article  Google Scholar 

  • Zhou, Y., Fang, Y., 2007. A two-layer key establishment scheme for wireless sensor networks. IEEE Trans. Mob. Comput., 6(9):1009–1020. [doi:10.1109/TMC.2007. 1008]

    Article  Google Scholar 

  • Zhou, Y., Zhang, Y., Fang, Y., 2007. Access control in wireless sensor networks. Ad Hoc Networks, 5(1):3–13. [doi:10.1016/j.adhoc.2006.05.014]

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dao-jing He.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fan, R., He, Dj., Pan, Xz. et al. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. J. Zhejiang Univ. - Sci. C 12, 550–560 (2011). https://doi.org/10.1631/jzus.C1000377

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/jzus.C1000377

Key words

CLC number

Navigation