skip to main content
10.1145/3341325.3342039acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT

Published: 01 July 2019 Publication History

Abstract

Use of modern machinery and technology has significantly reduced the labor work in agriculture. The next level was to make growth of vegetables/ crops independent of seasons. This was made possible by introducing greenhouses. Essence of greenhouse lies in control of environmental parameters like temperature, humidity, light, pressure and CO 2 as per specific crop needs. Integrating IOT technology with greenhouse enables us to remotely monitor the greenhouse environment and control its parameters intelligently. OT and WSNs deployed in greenhouse require a secure and efficient connectivity with monitoring/ control room. While deploying a WSN for greenhouse following aspects are worth considering. Hardware Connectivity User Authentication The objective of this research is to devise a user authentication scheme for deployment of IOT in greenhouse environment.

References

[1]
K. H. M. Wong, Yuan Zheng, Jiannong Cao, and Shengwei Wang, "A Dynamic User Authentication Scheme for Wireless Sensor Networks," pp. 244--251, 2006.
[2]
Sohail Jabbar, Muhammad Asif Habib, Abid Ali Minhas, Mudassar Ahmad, Rehan Ashraf, Shehzad Khalid, Kijun Han, "Analysis of Factors Affecting Energy Aware Routing in Wireless Sensor Network", Wireless Communication and Mobile Computing, Hindawi and Wiley, 2018.
[3]
T.-H. Chen and W.-K. Shih, "A robust mutual authentication protocol for wireless sensor networks," ETRI J., vol. 32, no. 5, pp. 704--712, 2010.
[4]
Muhammad Tausif, Javed Ferzund, Sohail Jabbar, Raheela Shahzadi, "Towards Designing Efficient Lightweight Ciphers for Internet of Things", KSII Transactions on Internet and Information Systems, Vol. 11, No. 8, Pages 4006--4024 2017.
[5]
P. Kumar and H.-J. Lee, "Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks," in 2011 Wireless Advanced, 2011, pp. 241--245.
[6]
H.-L. Yeh, T.-H. Chen, P.-C. Liu, T.-H. Kim, and H.-W. Wei, "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, vol. 11, no. 5, pp. 4767--4779, 2011.
[7]
P. Kumar, S.-G. Lee, and H.-J. Lee, "E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks," Sensors, vol. 12, no. 2, pp. 1625--1647, 2012.
[8]
S.-S. Y. D. He, N. Kumar, J. Chen, C.-C. Lee, N. Chilamkurti, "Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks, itle," Multimed. Syst., vol. 21, no. 1, pp. 49--60, 2015.
[9]
K. Xue, C. Ma, P. Hong, and R. Ding, "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks," J. Netw. Comput. Appl., vol. 36, no. 1, pp. 316--323, 2013.
[10]
Q. Jiang, J. Ma, X. Lu, and Y. Tian, "An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks," Peer-to-peer Netw. Appl., vol. 8, no. 6, pp. 1070--1081, 2015.
[11]
A. K. Das, "A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks," Peer-to-peer Netw. Appl., vol. 9, no. 1, pp. 223--244, 2016.
[12]
F. Wu, L. Xu, S. Kumari, and X. Li, "A new and secure authentication scheme for wireless sensor networks with formal proof," Peer-to-Peer Netw. Appl., vol. 10, no. 1, pp. 16--30, 2017.
[13]
M. Turkanović, B. Brumen, and M. Hölbl, "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion," Ad Hoc Networks, vol. 20, pp. 96--112, 2014.
[14]
R. Amin and G. P. Biswas, "A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks," Ad Hoc Networks, vol. 36, pp. 58--80, 2016.
[15]
M. S. Farash, M. Turkanović, S. Kumari, and M. Hölbl, "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment," Ad Hoc Networks, vol. 36, pp. 152--176, 2016.
[16]
R. Amin, S. K. H. Islam, G. P. Biswas, M. K. Khan, and N. Kumar, "A robust and anonymous patient monitoring system using wireless medical sensor networks," Futur. Gener. Comput. Syst., vol. 80, pp. 483--495, 2018.
[17]
X. Li, J. Niu, S. Kumari, J. Liao, W. Liang, and M. K. Khan, "A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity," Secur. Commun. Networks, vol. 9, no. 15, pp. 2643--2655, 2016.
[18]
F. Wu, L. Xu, S. Kumari, and X. Li, "An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks," Multimed. Syst., vol. 23, no. 2, pp. 195--205, 2017.
[19]
D. He, N. Kumar, J. Chen, C.-C. Lee, N. Chilamkurti, and S.-S. Yeo, "Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks," Multimed. Syst., vol. 21, no. 1, pp. 49--60, 2015.
[20]
F. Wu, L. Xu, S. Kumari, and X. Li, "An improved and provably secure three-factor user authentication scheme for wireless sensor networks," Peer-to-Peer Netw. Appl., vol. 11, no. 1, pp. 1--20, 2016.
[21]
S. Kumari and H. Om, "Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines," Comput. Networks, vol. 104, pp. 137--154, 2016.
[22]
C.-T. Li, C.-Y. Weng, and C.-C. Lee, "An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks," Sensors, vol. 13, no. 8, pp. 9589--9603, 2013.
[23]
D. He, N. Kumar, and N. Chilamkurti, "A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks," Inf. Sci. (Ny)., vol. 321, pp. 263--277, 2015.
[24]
P. Gope and T. Hwang, "A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks," IEEE Trans. Ind. Electron., vol. 63, no. 11, pp. 7124--7132, 2016.
[25]
J. Srinivas, S. Mukhopadhyay, and D. Mishra, "Secure and efficient user authentication scheme for multi-gateway wireless sensor networks," Ad Hoc Networks, vol. 54, pp. 147--169, 2017.
[26]
Muhammad Asif Habib, Mudassar Ahmad, Sohail jabbar, Syed Hassan Ahmad, Joel J. P. C. Rodrigues, "LEAIoT: A Lightweight Encryption Algorithm towards Low Latency Communication for Internet of Things", IEEE Consumer Electronic Magazine, Vol. 7, Issue 6, pp. 31--37, 2018.
[27]
F. Wu and L. Xu, "An improved and provable self-certified digital signature scheme with message recovery," Int. J. Commun. Syst., vol. 28, no. 2, pp. 344--357, 2015.
[28]
X. Wu, Fan and Xu, Lili and Kumari, Saru and Li, "A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security," J. Ambient Intell. Humaniz. Comput., vol. 8, no. 1, pp. 101--116, 2017.
[29]
D. Wang and P. Wang, "On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions," Comput. Networks, vol. 73, pp. 41--57, 2014.
[30]
F. Wu et al., "A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks," Secur. Commun. Networks, vol. 9, no. 16, pp. 3527--3542, 2016.
[31]
J. Srinivas, D. Mishra, and S. Mukhopadhyay, "A mutual authentication framework for wireless medical sensor networks," J. Med. Syst., vol. 41, no. 5, p. 80, 2017.
[32]
S. Kumari, X. Li, F. Wu, A. K. Das, H. Arshad, and M. K. Khan, "A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps," Futur. Gener. Comput. Syst., vol. 63, pp. 56--75, 2016.

Cited By

View all
  • (2022)IoT Based Smart Greenhouse Framework and Control Strategies for Sustainable AgricultureIEEE Access10.1109/ACCESS.2022.320406610(99394-99420)Online publication date: 2022
  • (2020)A Study on Device Automation: An Integration of Internet protocols and Embedded System2020 International Conference on Engineering and Emerging Technologies (ICEET)10.1109/ICEET48479.2020.9048204(1-6)Online publication date: Feb-2020

Index Terms

  1. User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICFNDS '19: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems
    July 2019
    346 pages
    ISBN:9781450371636
    DOI:10.1145/3341325
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • CNAM: Conservatoire des Arts et Métiers

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 July 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Agriculture
    2. Authentication
    3. IOT
    4. WSNs

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICFNDS '19

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)IoT Based Smart Greenhouse Framework and Control Strategies for Sustainable AgricultureIEEE Access10.1109/ACCESS.2022.320406610(99394-99420)Online publication date: 2022
    • (2020)A Study on Device Automation: An Integration of Internet protocols and Embedded System2020 International Conference on Engineering and Emerging Technologies (ICEET)10.1109/ICEET48479.2020.9048204(1-6)Online publication date: Feb-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media