Skip to main content

2017 | OriginalPaper | Buchkapitel

An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network

verfasst von : Xin Zhang, Fengtong Wen

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of the Internet of Things (IOT), peoples’ lifestyle and social inter-communication have been changed greatly. As a part of the IOT, wireless sensor network (WSN) also attracts many researchers to pay close attention. In this paper, we investigate one latest scheme (Farash et al.’s scheme) that provides an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. However, we find some shortcomings and weaknesses in this scheme. It cannot supply anonymity for users and sensors and cannot protect stolen smart card attack. So our work is to eliminate the threat of cryptographic attack and to improve security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Römer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11(6), 54–61 (2004)CrossRef Römer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11(6), 54–61 (2004)CrossRef
2.
Zurück zum Zitat Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., et al.: A survey on sensor networks. Commun. Mag. IEEE 40(8), 102–114 (2002)CrossRef Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., et al.: A survey on sensor networks. Commun. Mag. IEEE 40(8), 102–114 (2002)CrossRef
3.
Zurück zum Zitat Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., et al.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)CrossRef Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., et al.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)CrossRef
4.
Zurück zum Zitat Wong, K.H.M., Zheng, Y., Cao, J., et al.: A dynamic user authentication scheme for wireless sensor networks. In: International Conference on Sensor Networks, vol. 1, pp. 244–251. IEEE Press (2006) Wong, K.H.M., Zheng, Y., Cao, J., et al.: A dynamic user authentication scheme for wireless sensor networks. In: International Conference on Sensor Networks, vol. 1, pp. 244–251. IEEE Press (2006)
5.
Zurück zum Zitat Das, M.L.: Two-factor user authentication in wireless sensor networks. Trans. Wirel. Commun. 8(3), 1086–1090 (2009). IEEE PressCrossRef Das, M.L.: Two-factor user authentication in wireless sensor networks. Trans. Wirel. Commun. 8(3), 1086–1090 (2009). IEEE PressCrossRef
6.
Zurück zum Zitat He, D.J., Gao, Y., Chan, S., Chen, C., Bu, J.: An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 10(4), 361–371 (2010) He, D.J., Gao, Y., Chan, S., Chen, C., Bu, J.: An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 10(4), 361–371 (2010)
7.
Zurück zum Zitat Nyang, D.H., Lee, M.K.: Improvement of Dass two-factor authentication protocol in wireless sensor networks. In: CORD Conference Proceedings, p. 631 (2009) Nyang, D.H., Lee, M.K.: Improvement of Dass two-factor authentication protocol in wireless sensor networks. In: CORD Conference Proceedings, p. 631 (2009)
8.
Zurück zum Zitat Yeh, H.L., et al.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)CrossRef Yeh, H.L., et al.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)CrossRef
9.
Zurück zum Zitat Chen, T.H., Shih, W.K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010)CrossRef Chen, T.H., Shih, W.K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010)CrossRef
10.
Zurück zum Zitat Wen, F., Li, X.: An improved dynamic ID-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38(2), 381–387 (2011)CrossRefMathSciNet Wen, F., Li, X.: An improved dynamic ID-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38(2), 381–387 (2011)CrossRefMathSciNet
11.
Zurück zum Zitat Wen, F., Susilo, W., Yang, G.: A robust smart card based anonymous user authentication protocol for wireless communications. Secur. Commun. Netw. 7(6), 897–993 (2014)CrossRef Wen, F., Susilo, W., Yang, G.: A robust smart card based anonymous user authentication protocol for wireless communications. Secur. Commun. Netw. 7(6), 897–993 (2014)CrossRef
12.
Zurück zum Zitat Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security, CCS, vol. 2, pp. 41–47 (2002) Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security, CCS, vol. 2, pp. 41–47 (2002)
13.
Zurück zum Zitat Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36, 152–176 (2015)CrossRef Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36, 152–176 (2015)CrossRef
14.
Zurück zum Zitat Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20(2), 96–112 (2014)CrossRef Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20(2), 96–112 (2014)CrossRef
15.
Zurück zum Zitat Michael, B., Martin, A., Roger, N.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRef Michael, B., Martin, A., Roger, N.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRef
16.
Zurück zum Zitat Zhang, Y., Sun, X., Wang, B.: efficient algorithm for k-barrier coverage based on integer linear programming. China Commun. 13(7), 16–23 (2016)CrossRef Zhang, Y., Sun, X., Wang, B.: efficient algorithm for k-barrier coverage based on integer linear programming. China Commun. 13(7), 16–23 (2016)CrossRef
17.
Zurück zum Zitat Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., Linge, N.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016)CrossRef Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., Linge, N.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016)CrossRef
18.
Zurück zum Zitat Wang, B., Gu, X., Ma, L., Yan, S.: Temperature error correction based on BP neural network in meteorological WSN. Int. J. Sens. Netw. 23(4), 265–278 (2017)CrossRef Wang, B., Gu, X., Ma, L., Yan, S.: Temperature error correction based on BP neural network in meteorological WSN. Int. J. Sens. Netw. 23(4), 265–278 (2017)CrossRef
19.
Zurück zum Zitat Qu, Z., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun. 13(7), 108–116 (2016)CrossRef Qu, Z., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun. 13(7), 108–116 (2016)CrossRef
Metadaten
Titel
An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network
verfasst von
Xin Zhang
Fengtong Wen
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68542-7_17