A secure user authentication protocol for sensor network in data capturing

被引:8
作者
Zhou Quan [1 ,2 ]
Tang Chunming [1 ,2 ]
Zhen Xianghan [3 ]
Rong Chunming [4 ]
机构
[1] Guangzhou Univ, Higher Educ Inst, Key Lab Math & Interdisciplinary Sci Guangdong, Guangzhou, Guangdong, Peoples R China
[2] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Peoples R China
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou, Peoples R China
[4] Univ Stavanger, Fac Sci & Technol, Stavanger, Norway
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2015年 / 4卷 / 01期
基金
中国国家自然科学基金; 新加坡国家研究基金会;
关键词
Data capturing; Wireless sensor networks; User authentication; Identity-based cryptography;
D O I
10.1186/s13677-015-0030-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sensor network is an important approach of data capturing. User authentication is a critical security issue for sensor networks because sensor nodes are deployed in an open and unattended environment, leaving them possible hostile attack. Some researchers proposed some user authentication protocols using one-way hash function or using biometric technology. Recently, Yel et al. and Wenbo et al. proposed a user authentication protocols using elliptic curves cryptography. However, there are some security weaknesses for these protocols. In the paper, we review several proposed user authentication protocols, with a detail review of the Wenbo et al.'s user authentication protocol and a cryptanalysis of this protocol that shows several security weaknesses. Furthermore, we propose a secure user authentication protocol using identity-based cryptography to overcome those weaknesses. Finally, we present the security analysis, a comparison of security, computation, and performance for the proposed protocols, which shows that this user authentication protocol is more secure and suitable for higher security WSNs.
引用
收藏
页数:12
相关论文
共 26 条
[1]  
Althobaiti O, 2013, INT J DISTRIB SENS N, V2013, P1
[2]  
Benenson Z, 2005, REAL WORLD WIRELESS, P14
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[5]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[6]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[7]  
Han W, 2013, WEAKNESS SECURED AUT
[8]  
Kenneth NC, 2013, RISE BIG DATA ITS CH
[9]  
Khan MK, 2010, LECT NOTES COMPUT SC, V6059, P55, DOI 10.1007/978-3-642-13577-4_5
[10]   Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks' [J].
Khan, Muhammad Khurram ;
Alghathbar, Khaled .
SENSORS, 2010, 10 (03) :2450-2459