Abstract
As wireless sensor networks(WSNs) are susceptible to attacks and sensor nodes have limited resources, it is necessary to design a secure and lightweight user authentication protocol for WSNs. Over the past few years, a few user authentication schemes for WSNs were proposed, in which the concept of timestamps were employed without exception. Analysis shows that it brings new security flaws. An efficient and lightweight user authentication scheme for WSNs is proposed in this paper. In proposed scheme, we employ one-way hash function with a secret key. With the help of smart card, mutual authentication is performed using a challenge-response handshake between user and gateway node in both directions, and it avoids the problem of time synchronization between smart card and the gateway node. An analysis of the scheme is presented and it shows its resilience against classical types of attacks, and it adds less computational overhead than other schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Xiangqian, C., Makki, K., Kang, Y., Pissinou, N.: Sensor network security: a survey. IEEE Communications Surveys & Tutorials 11(2), 52–73 (2009)
Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8), 1501–1514 (2009)
Sharifi, M., Kashi, S.S., Ardakani, S.P.: Lap: A lightweight authentication protocol for smart dust wireless sensor networks. In: International Symposium on Collaborative Technologies and Systems, pp. 258–265 (2009)
Benenson, Z., Gartner, F., Kesdogan, D.: User Authentication in Sensor Networks (Extended Abstract). In: Lecture Notes in Informatics Proceedings of Informatik 2004, Workshop on Sensor Networks, Ulm, Germany (2004)
Benenson, Z., Gedicke, N., Raivio, O.: Realizing Robust User Authentication in Sensor Networks. In: Workshop on Real-World Wireless Sensor Networks, Sweden (2005)
Jiang, C.M., Li, B., Xu, H.: An Efficient Scheme for User Authentication in Wireless Sensor Networks. In: Proc. of 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW 2007 (2007)
Wong, K.H.M., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: Proc. of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), pp. 244–251 (2006)
Tseng, H.R., Jan, R.H., Yang, W.: An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks. In: IEEE Global Telecommunications Conference (GLOBECOM 2007), pp. 986–990 (2007)
Das, M.L.: Two-Factor User Authentication in Wireless Sensor Networks. IEEE Trans. Wireless Comm., 1086–1090 (2009)
Khan, M.K., Alghathbar, K.: Cryptanalysis and Security Improvements of Two-Factor User Authentication in Wireless Sensor Networks. Sensors 10(3), 2450–2459 (2010)
Vaidya, B., Markrakis, D., Mouftah, H.T.: Improved Two-factor user authentication in wireless sensor networks. In: 2nd International Workshop on Network Assurance and Security Services in Ubiquitous Environments, pp. 600–605 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, X., Xiong, Y. (2011). An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks. In: Liu, B., Chai, C. (eds) Information Computing and Applications. ICICA 2011. Lecture Notes in Computer Science, vol 7030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25255-6_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-25255-6_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25254-9
Online ISBN: 978-3-642-25255-6
eBook Packages: Computer ScienceComputer Science (R0)