An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks

被引:0
作者
Zhou, Xiancun [1 ]
Xiong, Yan [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci, Hefei 230026, Peoples R China
来源
INFORMATION COMPUTING AND APPLICATIONS | 2011年 / 7030卷
关键词
Wireless sensor network; user authentication; smart card;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As wireless sensor networks(WSNs) are susceptible to attacks and sensor nodes have limited resources, it is necessary to design a secure and lightweight user authentication protocol for WSNs. Over the past few years, a few user authentication schemes for WSNs were proposed, in which the concept of timestamps were employed without exception. Analysis shows that it brings new security flaws. An efficient and lightweight user authentication scheme for WSNs is proposed in this paper. In proposed scheme, we employ one-way hash function with a secret key. With the help of smart card, mutual authentication is performed using a challenge-response handshake between user and gateway node in both directions. and it avoids the problem of time synchronization between smart card and the gateway node. An analysis of the scheme is presented and it shows its resilience against classical types of attacks, and it adds less computational overhead than other schemes.
引用
收藏
页码:266 / 273
页数:8
相关论文
共 11 条
[1]  
Benenson Z., 2004, INF P INF 2004 WORKS
[2]  
Benenson Z., 2005, REAL WORLD WIRELESS
[3]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[4]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[5]   Using rough set theory to achieve reliable chemical solvents selection: A multi-attribute decision case study [J].
Jiang, Chaozhe ;
Hu, Pei ;
Liu, Dun ;
Xu, Fang ;
Yuan, Jixue .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,
[6]   Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks' [J].
Khan, Muhammad Khurram ;
Alghathbar, Khaled .
SENSORS, 2010, 10 (03) :2450-2459
[7]   Privacy preservation in wireless sensor networks: A state-of-the-art survey [J].
Li, Na ;
Zhang, Nan ;
Das, Sajal K. ;
Thuraisingham, Bhavani .
AD HOC NETWORKS, 2009, 7 (08) :1501-1514
[8]   LAP: A Lightweight Authentication Protocol for Smart Dust Wireless Sensor Networks [J].
Sharifi, Mohsen ;
Kashi, Saeed Sedighian ;
Ardakani, Saeed Pourroostaei .
PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, :258-265
[9]  
Tseng HR, 2007, GLOB TELECOMM CONF, P986
[10]   Improved Two-factor User Authentication in Wireless Sensor Networks [J].
Vaidya, Binod ;
Makrakis, Dimitrios ;
Mouftah, Hussein T. .
2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, :600-606