A secure three-factor authentication scheme for wireless sensor networks using ECC

被引:21
|
作者
Kumar, Devender [1 ]
Singh, Harsh Kumar [1 ]
Ahlawat, Chhahat [1 ]
机构
[1] Netaji Subhas Univ Technol Dwarka, Dept Informat Technol, Sect 3, New Delhi 110078, India
关键词
Authentication; ECC; Biometrics; Three factor; Wireless sensor networks; KEY AGREEMENT SCHEME; USER AUTHENTICATION; INTERNET;
D O I
10.1080/09720529.2019.1627072
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Wireless Sensor Networks (WSNs) consist of small and low powered devices called as sensor nodes. They have been used in many areas like military, safety, health, agriculture, etc. One of the challenging issues in them is to provide the secure communication as the channels used are wireless. User authentication is a mechanism which is used to provide the secure communication in them. Here, we propose a three-factor authentication scheme for WSNs using ECC. We simulate it using the ProVerif tool for its formal security verification. We also discuss its informal security analysis to show that it is resistant to various known attacks. We evaluate the performance of our scheme in terms of security features, computational cost, communication cost and storage cost along with that of the existing related schemes. We show that it is more secured than the others schemes and has less communication cost.
引用
收藏
页码:879 / 900
页数:22
相关论文
共 50 条
  • [1] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Huang, Wenfeng
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01)
  • [2] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Wenfeng Huang
    [J]. Scientific Reports, 14
  • [3] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 1 - 20
  • [4] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 1 - 20
  • [5] A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
    Wu, Tsu-Yang
    Yang, Lei
    Lee, Zhiyuan
    Chu, Shu-Chuan
    Kumari, Saru
    Kumar, Sachin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [6] Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks
    Ryu, Jihyeon
    Song, Taeui
    Moon, Jongho
    Kim, Hyoungshick
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 49 - 58
  • [8] A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things
    Xie, Qi
    Ding, Zixuan
    Hu, Bin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
    Ashok Kumar Das
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 223 - 244
  • [10] A Secure and Anonymous Authentication Protocol Based on Three-Factor Wireless Medical Sensor Networks
    Lee, JoonYoung
    Oh, Jihyeon
    Park, Youngho
    [J]. ELECTRONICS, 2023, 12 (06)