A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

被引:268
|
作者
Yeh, Hsiu-Lien [1 ]
Chen, Tien-Ho [2 ]
Liu, Pin-Chuan [2 ]
Kim, Tai-Hoo [3 ]
Wei, Hsin-Wen [4 ]
机构
[1] Natl Tsing Hua Univ, Inst Informat Syst & Applicat, Hsinchu 30013, Taiwan
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
[3] Hannam Univ, Dept Multimedia Engn, Taejon 306791, South Korea
[4] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
关键词
authentication; security; ECC; wireless sensor network; 2-FACTOR USER AUTHENTICATION; CRYPTANALYSIS;
D O I
10.3390/s110504767
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M. L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
引用
收藏
页码:4767 / 4779
页数:13
相关论文
共 50 条
  • [1] A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Shi, Wenbo
    Gong, Peng
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [2] A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
    Chen, Tien-ho
    Yeh, Hsiu-lien
    Liu, Pin-chuan
    Hsiang, Han-chen
    Shih, Wei-kuan
    [J]. COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 46 - 55
  • [3] Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Choi, Younsung
    Lee, Donghoon
    Kim, Jiye
    Jung, Jaewook
    Nam, Junghyun
    Won, Dongho
    [J]. SENSORS, 2014, 14 (06) : 10081 - 10106
  • [4] An Improved Two-Factor User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography
    Li, Chun-Ta
    Lee, Cheng-Chi
    Lee, Chin-Wen
    [J]. SENSOR LETTERS, 2013, 11 (05) : 958 - 965
  • [5] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Qazi, Rosheen
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Islam, Najam Ul
    Iqbal, Saleem
    Arshad, Arsalan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 547 - 566
  • [6] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Rosheen Qazi
    Kashif Naseer Qureshi
    Faisal Bashir
    Najam Ul Islam
    Saleem Iqbal
    Arsalan Arshad
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566
  • [7] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    [J]. International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [8] A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
    Chen, Huifang
    Ge, Linlin
    Xie, Lei
    [J]. SENSORS, 2015, 15 (07) : 17057 - 17075
  • [9] Design the Secured Message Authentication Code Protocol for Underwater Wireless Sensor Networks
    Yun, Chae-Won
    Lee, Jae -Noon
    Yi, OkYeon
    Park, Soo-Hyun
    Shin, Soo-Young
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2491 - 2495
  • [10] Evaluation of Authentication Based Elliptic Curve Cryptography in Wireless Sensor Networks in IoT Context
    Bettoumi, Balkis
    Bouallegue, Ridha
    [J]. 2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 258 - 262