Abstract
In hierarchical wireless sensor networks (H-WSNs), adaptive user authentication scheme has attracted significantly for the purposes of mutual authentication, session key establishment and resiliency to the attacks, like impersonation, parallel-session and password guessing. Several user authentication schemes have been proposed recently; though the schemes have had many potential vulnerabilities, such as key-impersonation, user anonymity, eavesdropping and masquerade. Thus, this paper proposes secure-cum-efficient mutual adaptive user authentication (S-Cum-EMAUA) scheme for practical use in H-WSNs. The scheme of S-Cum-EMAUA) is not only resilient to the most of the potential attacks, but also provides mutual authentication, user anonymity and session-key establishment. In addition, the proposed scheme is well secured, since it has the usage of the hash-function and X-OR operation.
Similar content being viewed by others
References
Dressler, F. (2008). Authenticated reliable and semi-reliable communication in wireless sensor networks. Journal of Network Security, 7(1), 61–68.
Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779.
Shi, W., & Gong, P. (2013). A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks, 2013. doi:10.1155/2013/730831.
Li, X., Qiu, W., Zheng, D., Chen, K., & Li, J. (2010). Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 57(2), 793–800.
Watro, R., Kong, D., Cuti, S.-F., Gardiner, C., Lynn, C., & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. In Proceeding of 2nd ACM workshop on security of Ad Hoc and sensor networks (SASN’04), Washington, DC, USA (pp. 59–64).
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
Wong, K. H. M., Zheng, Y., Cao, J., & Wang, S. (2006). A dynamic user authentication scheme for wireless sensor networks. In Proceeding of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), Taichung, Taiwan (pp. 244–251).
Khan, M. K., Kim, S., & Alghathbar, K. (2011). Cryptanalysis and security enhancement of a more efficient and secure dynamic id-based remote user authentication scheme. Computer Communications, 34(3), 305–309.
He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 10(4), 361–371.
Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors, 10(3), 2450–2459.
Kumar, P., & Lee, H.-J. (2011). Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In Proceeding of wireless advanced (WiAd’11), London, UK (pp. 241–245).
Huang, H.-F., Chang, Y.-F., & Liu, C.-H. (2010). Enhancement of two-factor user authentication in wireless sensor networks. In Proceeding of 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10), Darmstadt, Germany (pp. 27–30).
Vaidya, B., Makrakis, D., & Mouftah, H. T. (2010). Improved two factor user authentication in wireless sensor networks. In Proceeding of 6th annual IEEE international conference on wireless and mobile computing, networking and communications (WiMob’10), Niagara Falls, Canada (pp. 600–606).
Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712.
Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.
Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.
Yoon, E. J., & Yoo, K. Y. (2011). Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. In Proceeding of 10th IEEE international conference on cognitive informatics & cognitive computing (ICCI*CC), Banff, AB, Canada (pp. 392–396).
Nyang, D. H., & Lee, M. K. (2014). Improvement of Das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive. http://eprint.iacr.org/2009/631.pdf. Accessed January 20, 2014.
Li, C. T., Weng, C. Y., & Lee, C. C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors, 13(8), 9589–9603.
Yoo, S. G., Lee, H., & Kim, J. (2013). A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks, 2013. doi:10.1155/2013/543950.
Tseng, H. R., Jan, R. H., & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor networks. In Proceeding of global telecommunications conference (GLOBECOM’07), Washington, DC, USA (pp. 986–990).
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14, 10081–10106.
Vaidya, B., Makrakis, D., & Mouftah, H. (2012). Two-factor mutual authentication with key agreement in wireless sensor networks. Security and Communication Networks. doi:10.1002/sec.517.
Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.
Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Electrical and Electronic Engineering, 19(6), 109–116.
He, D. J., Chen, C., Ma, M. D., Chan, S. M., & Bu, J. J. (2013). A secure and efficient password authenticated group key exchange protocol for mobile ad hoc networks. International Journal of Communication Systems, 26(4), 495–504.
Lv, C., Ma, M., Li, H., Ma, J., & Zhang, Y. (2013). A novel three-party authenticated key exchange protocol using onetime key. Journal of Network and Computer Applications, 36, 298–503.
Ruan, Z. Q., Sun, X. M., & Liang, W. (2013). Securing sensor data storage and query based on k-out of n coding. International Journal of Communication Systems, 26(5), 549–566.
Duan, J., Gao, D., Foh, C., & Zhang, H. (2013). Tc-bac: A trust and centrality degree based access control model in wireless sensor networks. AdHoc Networks, 11(8), 2675–2692.
Kumar, P., Gurtov, A., Ylianttila, M., Lee, S.-H., & Lee, H. (2013). A strong authentication scheme with user privacy for wireless sensor networks. ETRI Journal, 35(5), 889–899.
Wang, D., & Ma, C. (2012). Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts & Telecommunications, 19(5), 104–114.
Sood, S., Sarje, A., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618.
Wu, S. H., Zhu, Y. F., & Pu, Q. (2012). Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks, 5(2), 236–248.
Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.
OpenIMSCore (2009). http://www.openim-score.org/
UCTIMS (2012). http://uctimsclient.berlios.de/
Deebak, B. D., Muthaiah, R., Thenmozhi, K., & Swaminathan, P. (2014). Evaluating three party authentication and key agreement protocol using IP multimedia server–client. Wireless Personal Communications, 81(1), 77–99.
Acknowledgments
The corresponding author would like to thank Tata Consultancy Services (TCS) for the financial assistance under the scheme of Research Scholar Program (RSP).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Deebak, B.D. Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems. Wireless Pers Commun 87, 1013–1035 (2016). https://doi.org/10.1007/s11277-015-2621-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2621-x