Skip to main content

An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks

  • Conference paper
Information Computing and Applications (ICICA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7030))

Included in the following conference series:

  • 2497 Accesses

Abstract

As wireless sensor networks(WSNs) are susceptible to attacks and sensor nodes have limited resources, it is necessary to design a secure and lightweight user authentication protocol for WSNs. Over the past few years, a few user authentication schemes for WSNs were proposed, in which the concept of timestamps were employed without exception. Analysis shows that it brings new security flaws. An efficient and lightweight user authentication scheme for WSNs is proposed in this paper. In proposed scheme, we employ one-way hash function with a secret key. With the help of smart card, mutual authentication is performed using a challenge-response handshake between user and gateway node in both directions, and it avoids the problem of time synchronization between smart card and the gateway node. An analysis of the scheme is presented and it shows its resilience against classical types of attacks, and it adds less computational overhead than other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xiangqian, C., Makki, K., Kang, Y., Pissinou, N.: Sensor network security: a survey. IEEE Communications Surveys & Tutorials 11(2), 52–73 (2009)

    Article  Google Scholar 

  2. Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8), 1501–1514 (2009)

    Article  Google Scholar 

  3. Sharifi, M., Kashi, S.S., Ardakani, S.P.: Lap: A lightweight authentication protocol for smart dust wireless sensor networks. In: International Symposium on Collaborative Technologies and Systems, pp. 258–265 (2009)

    Google Scholar 

  4. Benenson, Z., Gartner, F., Kesdogan, D.: User Authentication in Sensor Networks (Extended Abstract). In: Lecture Notes in Informatics Proceedings of Informatik 2004, Workshop on Sensor Networks, Ulm, Germany (2004)

    Google Scholar 

  5. Benenson, Z., Gedicke, N., Raivio, O.: Realizing Robust User Authentication in Sensor Networks. In: Workshop on Real-World Wireless Sensor Networks, Sweden (2005)

    Google Scholar 

  6. Jiang, C.M., Li, B., Xu, H.: An Efficient Scheme for User Authentication in Wireless Sensor Networks. In: Proc. of 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW 2007 (2007)

    Google Scholar 

  7. Wong, K.H.M., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: Proc. of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), pp. 244–251 (2006)

    Google Scholar 

  8. Tseng, H.R., Jan, R.H., Yang, W.: An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks. In: IEEE Global Telecommunications Conference (GLOBECOM 2007), pp. 986–990 (2007)

    Google Scholar 

  9. Das, M.L.: Two-Factor User Authentication in Wireless Sensor Networks. IEEE Trans. Wireless Comm., 1086–1090 (2009)

    Google Scholar 

  10. Khan, M.K., Alghathbar, K.: Cryptanalysis and Security Improvements of Two-Factor User Authentication in Wireless Sensor Networks. Sensors 10(3), 2450–2459 (2010)

    Article  Google Scholar 

  11. Vaidya, B., Markrakis, D., Mouftah, H.T.: Improved Two-factor user authentication in wireless sensor networks. In: 2nd International Workshop on Network Assurance and Security Services in Ubiquitous Environments, pp. 600–605 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, X., Xiong, Y. (2011). An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks. In: Liu, B., Chai, C. (eds) Information Computing and Applications. ICICA 2011. Lecture Notes in Computer Science, vol 7030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25255-6_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25255-6_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25254-9

  • Online ISBN: 978-3-642-25255-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics