An Enhanced and Secure Biometric Based User Authentication Scheme in Wireless Sensor Networks Using Smart Cards

被引:21
作者
Banerjee, Subhasish [1 ]
Chunka, Chukhu [1 ]
Sen, Srijon [2 ]
Goswami, Rajat Subhra [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Yupia 791110, Papum Pare, India
[2] IBM Corp, Bangalore, Karnataka, India
关键词
Biometric; Smart card; Wireless sensor network; Authentication; PROTOCOL;
D O I
10.1007/s11277-019-06252-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Over the last twodecades, several researchers have recommended many remote user authentication schemes, following since introducing the concept way back in 1981. Researchers are continuously trying to enhance the security in authentication protocols by incorporating the several features into their work. A few years back, Turkanovic et al. (Ad Hoc Netw 20:96-112, 2014) have presented a novel work for authenticating users in IOT environment using smart cards for wireless sensor networks. In this paper, we have demonstrated that their scheme doesn't resist many possible security threats and have numerous flaws, and also proposed an enhanced and secure biometric-based user authentication technique to overcome their weaknesses. The stated protocol not only overcome from the flaws of Turkanovic et al.'s scheme but also reduce the computation overhead as well. Later, to proving the mutual authentication among the entities and session key secrecy of the proposed scheme has also been verified by ProVerif (2.0) simulation tool.
引用
收藏
页码:243 / 270
页数:28
相关论文
共 39 条
[1]   Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications [J].
Al Ameen, Moshaddique ;
Liu, Jingwei ;
Kwak, Kyungsup .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (01) :93-101
[2]  
Al-Fayoumi M, 2016, INT J ADV COMPUT SC, V7, P52
[3]   Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards [J].
An, Younghwa .
JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY, 2012,
[4]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[5]  
Bindu CS, 2008, INT J COMPUT SCI NET, V8, P62
[6]  
Biswas S., 2015, Int. J. Comput. Appl., V131, P28
[7]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[8]   Wireless sensor networks for traffic monitoring in a logistic centre [J].
Bottero, M. ;
Dalla Chiara, B. ;
Deflorio, F. P. .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2013, 26 :99-124
[9]  
Chang C.C., 2010, INT J INTELLIGENT IN, V1, P41
[10]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712