User Authentication for Hierarchical Wireless Sensor Networks

被引:1
|
作者
Park, Minsu [1 ]
Kim, Hyunsung [1 ]
Lee, Sung-Woon [2 ]
机构
[1] Kyungil Univ, Dept Cyber Secur, Kyungbuk, South Korea
[2] Tongmyong Univ, Dept Informat Secur, Busan, South Korea
基金
新加坡国家研究基金会;
关键词
wireless sensor network; information security; user authentication; password-based authentication; smartcards; MUTUAL AUTHENTICATION; SCHEME; PROTOCOL; SECURITY;
D O I
10.1109/SNPD.2013.117
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor networks (WSNs) have a vast field of applications, including environment monitoring, battlefield surveillance and target tracking systems. As WSNs are usually deployed in remote or hostile environments and nodes are prone to compromise attacks, the adoption of key management is extremely important. Most queries in WSN applications are issued at the point of the base station or gateway node of the network. However, there is a great need to access the real-time data inside the network from the nodes because the real-time data may no longer be accessed through the base station only but also by the legal user with authority. To support the requirement, recently Das et al. proposed a dynamic password-based user authentication scheme for hierarchical WSNs. The purposes of this paper are to show Das et al.'s scheme has a security problem of password guessing attack with lost smartcard and to provide a remedy for the scheme. For this, we will give a security analysis of Das et al.'s scheme focused on the offline password guessing attack with the assumption that the attacker could steal user's smartcard and read the memory on it. Then, we will propose a user authentication scheme for hierarchical WSNs to solve the security problem in Das et al.'s scheme. Our scheme inherits the advantages from Das et al.'s scheme but solves the problems in it.
引用
收藏
页码:203 / 208
页数:6
相关论文
共 50 条
  • [1] An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks
    Pan, Tian-Yang
    Chen, Li-Quan
    Zhang, Yuan-Fang
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 632 - 635
  • [2] A Hierarchical Authentication Scheme in Wireless Sensor Networks
    Wu, Bing
    [J]. 2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 630 - 635
  • [3] A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sharma, Pranay
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1646 - 1656
  • [4] A dynamic User Authentication scheme for wireless sensor networks
    Wong, Kirk H. M.
    Zheng, Yuan
    Cao, Jiannong
    Wang, Shengwei
    [J]. IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 244 - +
  • [5] Security and authentication scheme for hierarchical wireless sensor networks
    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
    不详
    [J]. Dongnan Daxue Xuebao, 2008, SUPPL. 1 (243-248): : 243 - 248
  • [6] Recommendation of Multimodal User Authentication for Wireless Sensor Networks
    Preetha, S.
    Sheela, S., V
    [J]. 2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, 2019, : 117 - 122
  • [7] Enhanced User Authentication Scheme for Wireless Sensor Networks
    Park, Hee-Joo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 367 - 374
  • [8] An improved user authentication protocol for wireless sensor networks
    Kaur, Damandeep
    Kumar, Devender
    Saini, Khushil Kumar
    Grover, Harmanpreet Singh
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10):
  • [9] User authentication schemes for wireless sensor networks: A review
    Kumari, Saru
    Khan, Muhammad Khurram
    Atiquzzaman, Mohammed
    [J]. AD HOC NETWORKS, 2015, 27 : 159 - 194
  • [10] An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
    Turkanovic, M.
    Holbl, M.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2013, 19 (06) : 109 - 116