An improved biometric based user authentication and key agreement scheme for intelligent sensor based wireless communication

被引:12
|
作者
Khalid, Bushra [1 ]
Qureshi, Kashif Naseer [2 ]
Ghafoor, Kayhan Zrar [3 ]
Jeon, Gwanggil [4 ]
机构
[1] Bahria Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
[2] Univ Limerick, Dept Elect & Comp Engn, Limerick V94 T9PX, Ireland
[3] Knowledge Univ, Dept Comp Sci, Univ Pk,Kirkuk Rd, Erbil 446015, Iraq
[4] Incheon Natl Univ, Dept Embedded Syst Engn, Incheon, South Korea
关键词
Biometric; Communication; Agreement; Protocol; Authentication; Security;
D O I
10.1016/j.micpro.2022.104722
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The new communication technologies have changed the traditional networks processes and provides more feasible, and convenient services for healthcare, agriculture, and transportation. Ad hoc networks devices have limited resources for energy, storage and processing. The conventional and traditional security solutions are not suitable for small and tiny sensor nodes. The symmetric cryptography method consumes more energy than public key cryptography method, whereas the public key cryptography method is a resource-intensive and not suitable for wireless networks. The symmetric cryptosystems have key management issues. Different authentication mechanisms have been designed but almost all of them are either complex or insecure. Improving network security with less resources consumption, there is a need to design and develop more advance and lightweight solution. This paper proposed a Biometric based User Authentication and Key Agreement Protocol (BUAKA) that uses a fuzzy extractor and one-way hash functions for sensor nodes authentication. The proposed scheme has four phases: initialization, registration, authentication, and password renewal phase. The proposed scheme resolves the complexities issues by providing a secure authentication mechanism and provide great resilience against a number of attacks. Finally, the proposed scheme is evaluated using several parameters such as security attacks, computational cost, and communication overhead to measure the effectiveness of proposed scheme.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [22] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chang, Chin-Chen
    Hsueh, Wei-Yuan
    Cheng, Ting-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 447 - 465
  • [23] Cryptanalysis of "A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks"
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 312 - 317
  • [24] An improved remote user authentication scheme with key agreement
    Kumari, Saru
    Khan, Muhammad Khurram
    Li, Xiong
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1997 - 2012
  • [26] Improved Biometrics-Based Remote User Authentication Scheme with Session Key Agreement
    An, Younghwa
    COMPUTER APPLICATIONS FOR GRAPHICS, GRID COMPUTING, AND INDUSTRIAL ENVIRONMENT, 2012, 351 : 307 - 315
  • [27] An Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic Identity
    Shi, Yajuan
    Shen, Han
    Zhang, Yuanyuan
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 255 - 268
  • [28] An improved dynamic ID-based remote user authentication with key agreement scheme
    Wen, Fengtong
    Li, Xuelei
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 381 - 387
  • [29] An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme
    Qu, Juan
    Zou, Li-Min
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2013, 2013
  • [30] A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks
    Fan, Qing
    Chen, Jianhua
    Xu, Feng
    Li, Li
    Luo, Min
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):