An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks

被引:0
作者
Pan, Tian-Yang [1 ]
Chen, Li-Quan [1 ]
Zhang, Yuan-Fang [1 ]
机构
[1] Southeast Univ, Sch Informat Sci & Technol, Nanjing, Jiangsu, Peoples R China
来源
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016) | 2016年 / 44卷
基金
美国国家科学基金会;
关键词
hierarchical wireless sensor network (HWSN); user authentication; user anonymity; smart card; secret information updating; MUTUAL AUTHENTICATION; SCHEME; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The security of hierarchical wireless sensor network (HWSN) attracts more attentions with the rapid deployment of HWSN recently. In this paper, the user authentication technology of HWSN is investigated and a more efficient and more secure user authentication protocol is proposed. Overcoming the main faults of the previous protocols, this enhanced protocol makes the improvements in achieving the strong anonymity, preventing the attackers of guessing the password of the lost smart card, and updating the secret information independently and quickly. The security of the protocol is verified by using the Rubin Logic method. The computation load is evaluated and is acceptable for the real systems.
引用
收藏
页码:632 / 635
页数:4
相关论文
共 16 条
  • [1] A Robust Mutual Authentication Protocol for Wireless Sensor Networks
    Chen, Tien-Ho
    Shih, Wei-Kuan
    [J]. ETRI JOURNAL, 2010, 32 (05) : 704 - 712
  • [2] Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Choi, Younsung
    Lee, Donghoon
    Kim, Jiye
    Jung, Jaewook
    Nam, Junghyun
    Won, Dongho
    [J]. SENSORS, 2014, 14 (06) : 10081 - 10106
  • [3] A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sharma, Pranay
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1646 - 1656
  • [4] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [5] He DJ, 2010, AD HOC SENS WIREL NE, V10, P361
  • [6] Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
    He, Debiao
    Kumar, Neeraj
    Chen, Jianhua
    Lee, Cheng-Chi
    Chilamkurti, Naveen
    Yeo, Seng-Soo
    [J]. MULTIMEDIA SYSTEMS, 2015, 21 (01) : 49 - 60
  • [7] Secure and Efficient Data Communication Protocol for Wireless Body Area Networks
    Hu, Chunqiang
    Li, Hongjuan
    Huo, Yan
    Xiang, Tao
    Liao, Xiaofeng
    [J]. IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (02): : 94 - 107
  • [8] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    [J]. SENSORS, 2010, 10 (03) : 2450 - 2459
  • [9] Dynamic ID-based remote user password authentication schemes using smart cards: A review
    Madhusudhan, R.
    Mittal, R. C.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (04) : 1235 - 1248
  • [10] Maharana R., 2013, THESIS