Abstract
Currently, wireless sensor networks are a novel technology industry with various applications. The nodes deployed in such an environment are uncontrolled by anyone. Therefore, any security flaws can threaten future applications. Consequently, user authentication is an important issue for wireless sensor networks because it allows only authorized users to access real-time data from the sensor nodes or cluster heads via a base station. In addition, due to the cost-constrained factor of nodes, performance also is a crucial issue that must be considered. Thus, in this paper, we propose a secure and lightweight authentication scheme for heterogeneous wireless sensor networks using smart cards. In addition, we use dynamic identities to prevent threats to users’ privacy. Analyses of the security and performance of our scheme demonstrated that it can achieve mutual authentication and key agreement among users, a base station, and cluster heads; resist most potential attacks; and provide higher efficiency than previous schemes. Therefore, our proposed scheme is more suitable applications involving wireless sensor networks.
Similar content being viewed by others
References
Xu, K., Hong, X., & Gerla, M. (2002). An ad hoc network with mobile backbones. In Proceedings of IEEE international conference on communications (Vol. 5, pp. 3138–3143). New York, NY.
Du, X., & Lin, F. (2005) Improving routing in sensor networks with heterogeneous sensor nodes. In Proceedings of IEEE 61st vehicular technology conference (Vol. 4, pp. 2528–2532), May–Jun. 2005. Stockholm, Sweden.
Wong, K. H. M., Zheng, Y., Cao, J., & Wang, S. (2006) A dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (Vol. 1, pp. 244–251), Jul. 2006. Taichung, Taiwan.
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712.
He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 10(4), 361–371.
Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of ’two-factor user authentication in wireless sensor networks’. Sensors, 10(3), 2450–2459.
Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., & Wei, H.-W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curve cryptography. Sensors, 11(5), 2450–2459.
Yoon, E-J., & Yoo, K-Y. (2011). Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. In Proceedings of 10th IEEE international conference on cognitive informatics and cognitive computing (ICCI*CC) (pp. 392–396), Aug. 2011. Alberta, Canada
Vaidya, B., Makrakis, D., & Mouthy, H.T. (2010). Improved two-factor user authentication in wireless sensor networks. In Proceedings of IEEE 6th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 600–606), Oct. 2010. Canada: Niagara Falls.
Kumar, P., & Lee, H-J. (2011). Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In Proceedings of wireless advanced (WiAd) (pp. 241–245), Jun. 2011. London, UK
Fan, R., Ping, L.-D., Fu, J.-Q., & Pan, X.-Z. (2010). A secure and efficient user authentication protocol for two-tiered wireless sensor networks. In Proceedings of second Pacific-Asia conference on circuits, communications and system (PACCS 2010) (Vol. 1, pp. 425–428), Aug. 2010. Beijing, China
Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. K. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.
Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Electronics & Electrical Engineering, 19(6), 109–116.
Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.
Li, C.-T., Weng, C.-Y., & Lee, C.-C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors, 11(5), 9589–9603.
Das, A. K. (2009). An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks. In Proceedings of 1st international conference on communication systems and networks (COMSNETS 2009) (pp. 1–10), Jan. 2009. Bangalore, India
Goldreich, O., Goldwasser, S., & Micali, S. (1986). How to construct random functions. Journal of the ACM, 33(4), 792–807.
Cheng, Y., & Agrawal, D. (2007). An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks, 5(1), 35–48.
Hasegawa, T., Nakajima, J., & Matsui, M. (1998). A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer. In Proceedings of the first international workshop on practice and theory in public key cryptography (PKC’98) (Vol. 1431, pp. 182–194), Feb. 1998. Japan: Pacifico Yokohama.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chang, CC., Hsueh, WY. & Cheng, TF. A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Wireless Pers Commun 89, 447–465 (2016). https://doi.org/10.1007/s11277-016-3281-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3281-1