Skip to main content
Log in

A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Currently, wireless sensor networks are a novel technology industry with various applications. The nodes deployed in such an environment are uncontrolled by anyone. Therefore, any security flaws can threaten future applications. Consequently, user authentication is an important issue for wireless sensor networks because it allows only authorized users to access real-time data from the sensor nodes or cluster heads via a base station. In addition, due to the cost-constrained factor of nodes, performance also is a crucial issue that must be considered. Thus, in this paper, we propose a secure and lightweight authentication scheme for heterogeneous wireless sensor networks using smart cards. In addition, we use dynamic identities to prevent threats to users’ privacy. Analyses of the security and performance of our scheme demonstrated that it can achieve mutual authentication and key agreement among users, a base station, and cluster heads; resist most potential attacks; and provide higher efficiency than previous schemes. Therefore, our proposed scheme is more suitable applications involving wireless sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Xu, K., Hong, X., & Gerla, M. (2002). An ad hoc network with mobile backbones. In Proceedings of IEEE international conference on communications (Vol. 5, pp. 3138–3143). New York, NY.

  2. Du, X., & Lin, F. (2005) Improving routing in sensor networks with heterogeneous sensor nodes. In Proceedings of IEEE 61st vehicular technology conference (Vol. 4, pp. 2528–2532), May–Jun. 2005. Stockholm, Sweden.

  3. Wong, K. H. M., Zheng, Y., Cao, J., & Wang, S. (2006) A dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (Vol. 1, pp. 244–251), Jul. 2006. Taichung, Taiwan.

  4. Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.

    Article  Google Scholar 

  5. Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712.

    Article  Google Scholar 

  6. He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 10(4), 361–371.

    Google Scholar 

  7. Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of ’two-factor user authentication in wireless sensor networks’. Sensors, 10(3), 2450–2459.

    Article  Google Scholar 

  8. Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., & Wei, H.-W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curve cryptography. Sensors, 11(5), 2450–2459.

    Google Scholar 

  9. Yoon, E-J., & Yoo, K-Y. (2011). Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. In Proceedings of 10th IEEE international conference on cognitive informatics and cognitive computing (ICCI*CC) (pp. 392–396), Aug. 2011. Alberta, Canada

  10. Vaidya, B., Makrakis, D., & Mouthy, H.T. (2010). Improved two-factor user authentication in wireless sensor networks. In Proceedings of IEEE 6th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 600–606), Oct. 2010. Canada: Niagara Falls.

  11. Kumar, P., & Lee, H-J. (2011). Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In Proceedings of wireless advanced (WiAd) (pp. 241–245), Jun. 2011. London, UK

  12. Fan, R., Ping, L.-D., Fu, J.-Q., & Pan, X.-Z. (2010). A secure and efficient user authentication protocol for two-tiered wireless sensor networks. In Proceedings of second Pacific-Asia conference on circuits, communications and system (PACCS 2010) (Vol. 1, pp. 425–428), Aug. 2010. Beijing, China

  13. Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. K. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.

    Article  Google Scholar 

  14. Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Electronics & Electrical Engineering, 19(6), 109–116.

    Google Scholar 

  15. Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.

    Article  Google Scholar 

  16. Li, C.-T., Weng, C.-Y., & Lee, C.-C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors, 11(5), 9589–9603.

    Article  Google Scholar 

  17. Das, A. K. (2009). An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks. In Proceedings of 1st international conference on communication systems and networks (COMSNETS 2009) (pp. 1–10), Jan. 2009. Bangalore, India

  18. Goldreich, O., Goldwasser, S., & Micali, S. (1986). How to construct random functions. Journal of the ACM, 33(4), 792–807.

    Article  MathSciNet  MATH  Google Scholar 

  19. Cheng, Y., & Agrawal, D. (2007). An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks, 5(1), 35–48.

    Article  Google Scholar 

  20. Hasegawa, T., Nakajima, J., & Matsui, M. (1998). A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer. In Proceedings of the first international workshop on practice and theory in public key cryptography (PKC’98) (Vol. 1431, pp. 182–194), Feb. 1998. Japan: Pacifico Yokohama.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chang, CC., Hsueh, WY. & Cheng, TF. A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Wireless Pers Commun 89, 447–465 (2016). https://doi.org/10.1007/s11277-016-3281-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3281-1

Keywords

Navigation