User authentication schemes for wireless sensor networks: A review

被引:112
|
作者
Kumari, Saru [1 ]
Khan, Muhammad Khurram [2 ]
Atiquzzaman, Mohammed [3 ]
机构
[1] Agra Coll, Dept Math, Agra, Uttar Pradesh, India
[2] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[3] Univ Oklahoma, Sch Comp Sci, Norman, OK 73019 USA
关键词
User authentication; Wireless sensor networks; Gateway node bypass; User impersonation; User anonymity; Security and usability; SECURITY; CRYPTANALYSIS; PROTOCOL;
D O I
10.1016/j.adhoc.2014.11.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very common to those which demand crucial security concerns. The deployment of WSNs in unattended environments and the resource-constrained nature of the constituent sensor nodes give rise to an open challenge to ensure that only authorized access to the information is available through the sensor nodes. Many researchers have made considerable efforts to meet this challenge by designing secure and dependable user authentication mechanisms. Every proposed scheme, with its advantages and disadvantages is cryptanalyzed to measure its respective strength and shortcomings. In this study, we first present twenty two features that a reliable user authentication scheme for WSNs should possess. We then evaluate seven of the available schemes against these twenty two features. A common tendency among all the available schemes is their failure to resist gateway node bypass attack, node capture attack and user impersonation attack. There is hardly any scheme that provides user anonymity and reparability in case of smart card loss or theft. Further mutual establishment of a session key between the three participating entities namely user, gateway node and sensor node is achieved in only one scheme; it is an integral characteristic to achieve the confidentiality of messages transmitted over open channels. The mutual authentication between the participating entities is another important aspect which is somewhat fulfilled by only two schemes; only one scheme resists denial of service attack and provides security to gateway node secret parameter. It is time to take halt, ponder upon the acquired objectives and set new goals to equip the contemporary state of art in this field with more viable and promising approaches. We review the state of art in this area; our goal is to explore the course of action for future proposals resulting in protocols with greater potential of usage in industry, military and other purposes. We opine that researchers should develop authentication schemes which take into account the desirable features discussed in this paper. We also discuss future path with some key issues and challenges in the area. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:159 / 194
页数:36
相关论文
共 50 条
  • [1] Authentication Schemes for Wireless Sensor Networks
    Tajeddine, Ayman
    Kayssi, Ayman
    Chehab, Ali
    Elhajj, Imad
    [J]. 2014 17TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2014, : 367 - 372
  • [2] Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks
    Wang, Chenyu
    Wang, Ding
    Tu, Yi
    Xu, Guoai
    Wang, Huaxiong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 507 - 523
  • [3] A Survey on Two-Factor User Authentication Schemes in Wireless Sensor Networks
    Kaur, Sharanjeet
    Khandnor, P.
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1077 - 1081
  • [4] User Authentication for Hierarchical Wireless Sensor Networks
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    [J]. 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 203 - 208
  • [5] Understanding the security failures of four user authentication schemes for wireless sensor networks in IoT environment
    Tyagi, Gaurav
    Kumar, Rahul
    [J]. International Journal of Computers and Applications, 2024, 46 (09) : 769 - 784
  • [6] A dynamic User Authentication scheme for wireless sensor networks
    Wong, Kirk H. M.
    Zheng, Yuan
    Cao, Jiannong
    Wang, Shengwei
    [J]. IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 244 - +
  • [7] Enhanced User Authentication Scheme for Wireless Sensor Networks
    Park, Hee-Joo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 367 - 374
  • [8] Recommendation of Multimodal User Authentication for Wireless Sensor Networks
    Preetha, S.
    Sheela, S., V
    [J]. 2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, 2019, : 117 - 122
  • [9] An improved user authentication protocol for wireless sensor networks
    Kaur, Damandeep
    Kumar, Devender
    Saini, Khushil Kumar
    Grover, Harmanpreet Singh
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10):
  • [10] Security Analysis of the Authentication Schemes Based on Wireless Sensor Networks
    Yu, Binbin
    Hu, Liang
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING (AMCCE 2017), 2017, 118 : 677 - 686