Skip to main content
Log in

Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In hierarchical wireless sensor networks (H-WSNs), adaptive user authentication scheme has attracted significantly for the purposes of mutual authentication, session key establishment and resiliency to the attacks, like impersonation, parallel-session and password guessing. Several user authentication schemes have been proposed recently; though the schemes have had many potential vulnerabilities, such as key-impersonation, user anonymity, eavesdropping and masquerade. Thus, this paper proposes secure-cum-efficient mutual adaptive user authentication (S-Cum-EMAUA) scheme for practical use in H-WSNs. The scheme of S-Cum-EMAUA) is not only resilient to the most of the potential attacks, but also provides mutual authentication, user anonymity and session-key establishment. In addition, the proposed scheme is well secured, since it has the usage of the hash-function and X-OR operation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Dressler, F. (2008). Authenticated reliable and semi-reliable communication in wireless sensor networks. Journal of Network Security, 7(1), 61–68.

    Google Scholar 

  2. Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779.

    Article  Google Scholar 

  3. Shi, W., & Gong, P. (2013). A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks, 2013. doi:10.1155/2013/730831.

  4. Li, X., Qiu, W., Zheng, D., Chen, K., & Li, J. (2010). Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 57(2), 793–800.

    Article  Google Scholar 

  5. Watro, R., Kong, D., Cuti, S.-F., Gardiner, C., Lynn, C., & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. In Proceeding of 2nd ACM workshop on security of Ad Hoc and sensor networks (SASN’04), Washington, DC, USA (pp. 59–64).

  6. Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.

    Article  Google Scholar 

  7. Wong, K. H. M., Zheng, Y., Cao, J., & Wang, S. (2006). A dynamic user authentication scheme for wireless sensor networks. In Proceeding of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), Taichung, Taiwan (pp. 244–251).

  8. Khan, M. K., Kim, S., & Alghathbar, K. (2011). Cryptanalysis and security enhancement of a more efficient and secure dynamic id-based remote user authentication scheme. Computer Communications, 34(3), 305–309.

    Article  Google Scholar 

  9. He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 10(4), 361–371.

    Google Scholar 

  10. Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors, 10(3), 2450–2459.

    Article  Google Scholar 

  11. Kumar, P., & Lee, H.-J. (2011). Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In Proceeding of wireless advanced (WiAd’11), London, UK (pp. 241–245).

  12. Huang, H.-F., Chang, Y.-F., & Liu, C.-H. (2010). Enhancement of two-factor user authentication in wireless sensor networks. In Proceeding of 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10), Darmstadt, Germany (pp. 27–30).

  13. Vaidya, B., Makrakis, D., & Mouftah, H. T. (2010). Improved two factor user authentication in wireless sensor networks. In Proceeding of 6th annual IEEE international conference on wireless and mobile computing, networking and communications (WiMob’10), Niagara Falls, Canada (pp. 600–606).

  14. Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712.

    Article  Google Scholar 

  15. Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.

    Article  Google Scholar 

  16. Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.

    Article  Google Scholar 

  17. Yoon, E. J., & Yoo, K. Y. (2011). Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. In Proceeding of 10th IEEE international conference on cognitive informatics & cognitive computing (ICCI*CC), Banff, AB, Canada (pp. 392–396).

  18. Nyang, D. H., & Lee, M. K. (2014). Improvement of Das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive. http://eprint.iacr.org/2009/631.pdf. Accessed January 20, 2014.

  19. Li, C. T., Weng, C. Y., & Lee, C. C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors, 13(8), 9589–9603.

    Article  Google Scholar 

  20. Yoo, S. G., Lee, H., & Kim, J. (2013). A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks, 2013. doi:10.1155/2013/543950.

  21. Tseng, H. R., Jan, R. H., & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor networks. In Proceeding of global telecommunications conference (GLOBECOM’07), Washington, DC, USA (pp. 986–990).

  22. Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14, 10081–10106.

    Article  Google Scholar 

  23. Vaidya, B., Makrakis, D., & Mouftah, H. (2012). Two-factor mutual authentication with key agreement in wireless sensor networks. Security and Communication Networks. doi:10.1002/sec.517.

    Google Scholar 

  24. Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.

    Article  Google Scholar 

  25. Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Electrical and Electronic Engineering, 19(6), 109–116.

    Google Scholar 

  26. He, D. J., Chen, C., Ma, M. D., Chan, S. M., & Bu, J. J. (2013). A secure and efficient password authenticated group key exchange protocol for mobile ad hoc networks. International Journal of Communication Systems, 26(4), 495–504.

    Article  Google Scholar 

  27. Lv, C., Ma, M., Li, H., Ma, J., & Zhang, Y. (2013). A novel three-party authenticated key exchange protocol using onetime key. Journal of Network and Computer Applications, 36, 298–503.

    Article  Google Scholar 

  28. Ruan, Z. Q., Sun, X. M., & Liang, W. (2013). Securing sensor data storage and query based on k-out of n coding. International Journal of Communication Systems, 26(5), 549–566.

    Article  Google Scholar 

  29. Duan, J., Gao, D., Foh, C., & Zhang, H. (2013). Tc-bac: A trust and centrality degree based access control model in wireless sensor networks. AdHoc Networks, 11(8), 2675–2692.

    Article  Google Scholar 

  30. Kumar, P., Gurtov, A., Ylianttila, M., Lee, S.-H., & Lee, H. (2013). A strong authentication scheme with user privacy for wireless sensor networks. ETRI Journal, 35(5), 889–899.

    Article  Google Scholar 

  31. Wang, D., & Ma, C. (2012). Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts & Telecommunications, 19(5), 104–114.

    Article  Google Scholar 

  32. Sood, S., Sarje, A., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618.

    Article  Google Scholar 

  33. Wu, S. H., Zhu, Y. F., & Pu, Q. (2012). Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks, 5(2), 236–248.

    Article  Google Scholar 

  34. Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.

    Article  Google Scholar 

  35. OpenIMSCore (2009). http://www.openim-score.org/

  36. UCTIMS (2012). http://uctimsclient.berlios.de/

  37. Deebak, B. D., Muthaiah, R., Thenmozhi, K., & Swaminathan, P. (2014). Evaluating three party authentication and key agreement protocol using IP multimedia server–client. Wireless Personal Communications, 81(1), 77–99.

    Article  Google Scholar 

Download references

Acknowledgments

The corresponding author would like to thank Tata Consultancy Services (TCS) for the financial assistance under the scheme of Research Scholar Program (RSP).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bakkiam David Deebak.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Deebak, B.D. Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems. Wireless Pers Commun 87, 1013–1035 (2016). https://doi.org/10.1007/s11277-015-2621-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2621-x

Keywords

Navigation