A Biometric-Based User Authentication for Wireless Sensor Networks

被引:3
作者
YUAN Jianjun
机构
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
authentication; biometrics; security; wireless sensor networks;
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN929.5 [移动通信];
学科分类号
080202 ; 080402 ; 080904 ; 0810 ; 081001 ;
摘要
This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. The protocol employs biometric keys and resists the threats of stolen verifier, of which many are logged-in users with the same login identity, guessing, replay, and impersonation. The protocol uses only Hash function and saves the computational cost, the communication cost, and the energy cost. In addition, the user’s password can be changed freely using the proposed protocol.
引用
收藏
页码:272 / 276
页数:5
相关论文
共 7 条
[1]   Improving the security of 'a flexible biometrics remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) :82-85
[2]   A flexible biometrics remote user authentication scheme [J].
Lin, CH ;
Lai, YY .
COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) :19-23
[3]  
SPINS: Security Protocols for Sensor Networks[J] . Adrian Perrig,Robert Szewczyk,J.D. Tygar,Victor Wen,David E. Culler.Wireless Networks . 2002 (5)
[4]  
Chaotic Hash-based fingerprint biometric remote user authentication scheme on mobile devices. Khan M K,Zhang J,Wang X. Chaos Solitons Fractals . 2008
[5]  
Improved remote authentication scheme with smart card. Lee N Y,Chiu Y C. Computers and Standards . 2005
[6]  
TinyPK:Securing Sensor Networks with Public Key Technology. Ronald Watro,Derrick Kong,Sue-fen Cuti,Charles Gardiner,Charles Lynn,Peter Kruus. Proc.2nd ACM Wksp, Security of Ad hoc and Sensor Networks . 2004
[7]  
the advanced encryption standard. Daemen J,Rijmen V.Rijndael. Dr Dobb‘s J . 2001