Skip to main content

A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System

  • Conference paper
  • First Online:
Internet of Vehicles. Technologies and Services Towards Smart City (IOV 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11253))

Included in the following conference series:

Abstract

As wireless sensor networks (WSN) and Internet of things (IoT) have rapidly developed over recent years, the smart vehicular system is designed in the environment of WSN to provide vehicle related applications such as traffic safety for drivers, controlling traffic signal, broadcasting traffic information and speed monitoring etc. Recently, Mohit et al. have proposed an authentication protocol for WSN-based smart vehicular system. Their protocol consists of three main entities namely vehicle sensor, sink node and user. Vehicle sensors collected traffic data and send it to a sink node of WSN. User used traffic data from sink node in off-line mode for the traffic management. Mohit et al. claimed that the proposed protocol is secure against various attacks such as untraceable, impersonation and password guessing attacks. However, their proposed protocol still has some vulnerabilities such as absence of session key, suffering user duplication and sink node impersonation attacks. Thus their protocol cannot guarantee complete security. In this paper, we aim to propose an improved protocol based on their work which overcomes these security loopholes in their protocol. The informal security analysis shows that our proposed protocol is cable to defend the security weaknesses found in Mohit et al.’s authentication protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, T.H., Shih, W.K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010)

    Article  Google Scholar 

  2. Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086–1090 (2009)

    Article  Google Scholar 

  3. Förster, D., Kargl, F., Löhr, H.: PUCA: a pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks. Ad Hoc Netw. 37(1), 122–132 (2016)

    Article  Google Scholar 

  4. He, D., Kumar, N., Chen, J., Lee, C.C., Chilamkurti, N., Yeo, S.S.: Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1), 49–60 (2015)

    Article  Google Scholar 

  5. Kang, Q., Liu, X., Yao, Y., Wang, Z., Li, Y.: Efficient authentication and access control of message dissemination over vehicular ad hoc network. Neurocomputing 181, 132–138 (2016)

    Article  Google Scholar 

  6. Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450–2459 (2010)

    Article  Google Scholar 

  7. Lee, C.C., Lai, Y.M., Cheng, P.J.: An efficient multiple session key establishment scheme for VANET group integration. IEEE Intell. Syst. 31(6), 35–43 (2016)

    Article  Google Scholar 

  8. Li, C.T., Hwang, M.S., Chu, Y.P.: A secure and efficient communication scheme with authenticated key establishment and privacy preservation for vehicular ad hoc networks. Comput. Commun. 31(12), 2803–2814 (2008)

    Article  Google Scholar 

  9. Li, C.T., Wu, T.Y., Chen, C.L., Lee, C.C., Chen, C.M.: An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors 17(7), 1–18 (2017). Article no. 1482

    Article  Google Scholar 

  10. Li, C.T., Lee, C.C., Weng, C.Y., Chen, C.M.: A secure three party node authentication and key establishment scheme for the Internet of things environment. J. Internet Technol. 19(1), 147–155 (2018)

    Google Scholar 

  11. Li, C.T., Lee, C.C., Weng, C.Y., Chen, C.M.: Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw. Appl. 11(1), 198–208 (2018)

    Article  Google Scholar 

  12. Manvi, S.S., Tangade, S.: A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 9, 19–30 (2017)

    Google Scholar 

  13. Mohit, P., Amin, R., Biswas, G.P.: Design of authentication protocol for wireless sensor network-based smart vehicular system. Veh. Commun. 9, 64–71 (2017)

    Google Scholar 

  14. Mokhtar, B., Azab, M.: Suvery on security issues in vehicular ad hoc networks. Alexandria Eng. J. 54(4), 1115–1126 (2015)

    Article  Google Scholar 

  15. Nyang, D., Lee, M.K.: Improvement of Das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive, 2009:630 (2009)

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their valuable comments and suggestions. This research was partially supported by the Ministry of Science and Technology, Taiwan, R.O.C., under contract no.: MOST 107-2410-H-165-001.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Chin-Ling Chen or Cheng-Chi Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, CT., Weng, CY., Chen, CL., Lee, CC. (2018). A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System. In: Skulimowski, A., Sheng, Z., Khemiri-Kallel, S., Cérin, C., Hsu, CH. (eds) Internet of Vehicles. Technologies and Services Towards Smart City. IOV 2018. Lecture Notes in Computer Science(), vol 11253. Springer, Cham. https://doi.org/10.1007/978-3-030-05081-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05081-8_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05080-1

  • Online ISBN: 978-3-030-05081-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics