Skip to main content
Erschienen in: Wireless Personal Communications 3/2016

01.04.2016

Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems

verfasst von: Bakkiam David Deebak

Erschienen in: Wireless Personal Communications | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In hierarchical wireless sensor networks (H-WSNs), adaptive user authentication scheme has attracted significantly for the purposes of mutual authentication, session key establishment and resiliency to the attacks, like impersonation, parallel-session and password guessing. Several user authentication schemes have been proposed recently; though the schemes have had many potential vulnerabilities, such as key-impersonation, user anonymity, eavesdropping and masquerade. Thus, this paper proposes secure-cum-efficient mutual adaptive user authentication (S-Cum-EMAUA) scheme for practical use in H-WSNs. The scheme of S-Cum-EMAUA) is not only resilient to the most of the potential attacks, but also provides mutual authentication, user anonymity and session-key establishment. In addition, the proposed scheme is well secured, since it has the usage of the hash-function and X-OR operation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dressler, F. (2008). Authenticated reliable and semi-reliable communication in wireless sensor networks. Journal of Network Security, 7(1), 61–68. Dressler, F. (2008). Authenticated reliable and semi-reliable communication in wireless sensor networks. Journal of Network Security, 7(1), 61–68.
2.
Zurück zum Zitat Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779.CrossRef Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779.CrossRef
3.
Zurück zum Zitat Shi, W., & Gong, P. (2013). A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks, 2013. doi:10.1155/2013/730831. Shi, W., & Gong, P. (2013). A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks, 2013. doi:10.​1155/​2013/​730831.
4.
Zurück zum Zitat Li, X., Qiu, W., Zheng, D., Chen, K., & Li, J. (2010). Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 57(2), 793–800.CrossRef Li, X., Qiu, W., Zheng, D., Chen, K., & Li, J. (2010). Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 57(2), 793–800.CrossRef
5.
Zurück zum Zitat Watro, R., Kong, D., Cuti, S.-F., Gardiner, C., Lynn, C., & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. In Proceeding of 2nd ACM workshop on security of Ad Hoc and sensor networks (SASN’04), Washington, DC, USA (pp. 59–64). Watro, R., Kong, D., Cuti, S.-F., Gardiner, C., Lynn, C., & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. In Proceeding of 2nd ACM workshop on security of Ad Hoc and sensor networks (SASN’04), Washington, DC, USA (pp. 59–64).
6.
Zurück zum Zitat Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.CrossRef Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.CrossRef
7.
Zurück zum Zitat Wong, K. H. M., Zheng, Y., Cao, J., & Wang, S. (2006). A dynamic user authentication scheme for wireless sensor networks. In Proceeding of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), Taichung, Taiwan (pp. 244–251). Wong, K. H. M., Zheng, Y., Cao, J., & Wang, S. (2006). A dynamic user authentication scheme for wireless sensor networks. In Proceeding of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), Taichung, Taiwan (pp. 244–251).
8.
Zurück zum Zitat Khan, M. K., Kim, S., & Alghathbar, K. (2011). Cryptanalysis and security enhancement of a more efficient and secure dynamic id-based remote user authentication scheme. Computer Communications, 34(3), 305–309.CrossRef Khan, M. K., Kim, S., & Alghathbar, K. (2011). Cryptanalysis and security enhancement of a more efficient and secure dynamic id-based remote user authentication scheme. Computer Communications, 34(3), 305–309.CrossRef
9.
Zurück zum Zitat He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 10(4), 361–371. He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 10(4), 361–371.
10.
Zurück zum Zitat Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors, 10(3), 2450–2459.CrossRef Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors, 10(3), 2450–2459.CrossRef
11.
Zurück zum Zitat Kumar, P., & Lee, H.-J. (2011). Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In Proceeding of wireless advanced (WiAd’11), London, UK (pp. 241–245). Kumar, P., & Lee, H.-J. (2011). Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In Proceeding of wireless advanced (WiAd’11), London, UK (pp. 241–245).
12.
Zurück zum Zitat Huang, H.-F., Chang, Y.-F., & Liu, C.-H. (2010). Enhancement of two-factor user authentication in wireless sensor networks. In Proceeding of 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10), Darmstadt, Germany (pp. 27–30). Huang, H.-F., Chang, Y.-F., & Liu, C.-H. (2010). Enhancement of two-factor user authentication in wireless sensor networks. In Proceeding of 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10), Darmstadt, Germany (pp. 27–30).
13.
Zurück zum Zitat Vaidya, B., Makrakis, D., & Mouftah, H. T. (2010). Improved two factor user authentication in wireless sensor networks. In Proceeding of 6th annual IEEE international conference on wireless and mobile computing, networking and communications (WiMob’10), Niagara Falls, Canada (pp. 600–606). Vaidya, B., Makrakis, D., & Mouftah, H. T. (2010). Improved two factor user authentication in wireless sensor networks. In Proceeding of 6th annual IEEE international conference on wireless and mobile computing, networking and communications (WiMob’10), Niagara Falls, Canada (pp. 600–606).
14.
Zurück zum Zitat Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712.CrossRef Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712.CrossRef
15.
Zurück zum Zitat Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.CrossRef Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.CrossRef
16.
Zurück zum Zitat Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.CrossRef Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.CrossRef
17.
Zurück zum Zitat Yoon, E. J., & Yoo, K. Y. (2011). Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. In Proceeding of 10th IEEE international conference on cognitive informatics & cognitive computing (ICCI*CC), Banff, AB, Canada (pp. 392–396). Yoon, E. J., & Yoo, K. Y. (2011). Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. In Proceeding of 10th IEEE international conference on cognitive informatics & cognitive computing (ICCI*CC), Banff, AB, Canada (pp. 392–396).
19.
Zurück zum Zitat Li, C. T., Weng, C. Y., & Lee, C. C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors, 13(8), 9589–9603.CrossRef Li, C. T., Weng, C. Y., & Lee, C. C. (2013). An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors, 13(8), 9589–9603.CrossRef
20.
Zurück zum Zitat Yoo, S. G., Lee, H., & Kim, J. (2013). A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks, 2013. doi:10.1155/2013/543950. Yoo, S. G., Lee, H., & Kim, J. (2013). A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks, 2013. doi:10.​1155/​2013/​543950.
21.
Zurück zum Zitat Tseng, H. R., Jan, R. H., & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor networks. In Proceeding of global telecommunications conference (GLOBECOM’07), Washington, DC, USA (pp. 986–990). Tseng, H. R., Jan, R. H., & Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor networks. In Proceeding of global telecommunications conference (GLOBECOM’07), Washington, DC, USA (pp. 986–990).
22.
Zurück zum Zitat Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14, 10081–10106.CrossRef Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14, 10081–10106.CrossRef
23.
Zurück zum Zitat Vaidya, B., Makrakis, D., & Mouftah, H. (2012). Two-factor mutual authentication with key agreement in wireless sensor networks. Security and Communication Networks. doi:10.1002/sec.517. Vaidya, B., Makrakis, D., & Mouftah, H. (2012). Two-factor mutual authentication with key agreement in wireless sensor networks. Security and Communication Networks. doi:10.​1002/​sec.​517.
24.
Zurück zum Zitat Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.CrossRef Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.CrossRef
25.
Zurück zum Zitat Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Electrical and Electronic Engineering, 19(6), 109–116. Turkanovic, M., & Holbl, M. (2013). An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Electrical and Electronic Engineering, 19(6), 109–116.
26.
Zurück zum Zitat He, D. J., Chen, C., Ma, M. D., Chan, S. M., & Bu, J. J. (2013). A secure and efficient password authenticated group key exchange protocol for mobile ad hoc networks. International Journal of Communication Systems, 26(4), 495–504.CrossRef He, D. J., Chen, C., Ma, M. D., Chan, S. M., & Bu, J. J. (2013). A secure and efficient password authenticated group key exchange protocol for mobile ad hoc networks. International Journal of Communication Systems, 26(4), 495–504.CrossRef
27.
Zurück zum Zitat Lv, C., Ma, M., Li, H., Ma, J., & Zhang, Y. (2013). A novel three-party authenticated key exchange protocol using onetime key. Journal of Network and Computer Applications, 36, 298–503.CrossRef Lv, C., Ma, M., Li, H., Ma, J., & Zhang, Y. (2013). A novel three-party authenticated key exchange protocol using onetime key. Journal of Network and Computer Applications, 36, 298–503.CrossRef
28.
Zurück zum Zitat Ruan, Z. Q., Sun, X. M., & Liang, W. (2013). Securing sensor data storage and query based on k-out of n coding. International Journal of Communication Systems, 26(5), 549–566.CrossRef Ruan, Z. Q., Sun, X. M., & Liang, W. (2013). Securing sensor data storage and query based on k-out of n coding. International Journal of Communication Systems, 26(5), 549–566.CrossRef
29.
Zurück zum Zitat Duan, J., Gao, D., Foh, C., & Zhang, H. (2013). Tc-bac: A trust and centrality degree based access control model in wireless sensor networks. AdHoc Networks, 11(8), 2675–2692.CrossRef Duan, J., Gao, D., Foh, C., & Zhang, H. (2013). Tc-bac: A trust and centrality degree based access control model in wireless sensor networks. AdHoc Networks, 11(8), 2675–2692.CrossRef
30.
Zurück zum Zitat Kumar, P., Gurtov, A., Ylianttila, M., Lee, S.-H., & Lee, H. (2013). A strong authentication scheme with user privacy for wireless sensor networks. ETRI Journal, 35(5), 889–899.CrossRef Kumar, P., Gurtov, A., Ylianttila, M., Lee, S.-H., & Lee, H. (2013). A strong authentication scheme with user privacy for wireless sensor networks. ETRI Journal, 35(5), 889–899.CrossRef
31.
Zurück zum Zitat Wang, D., & Ma, C. (2012). Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts & Telecommunications, 19(5), 104–114.CrossRef Wang, D., & Ma, C. (2012). Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts & Telecommunications, 19(5), 104–114.CrossRef
32.
Zurück zum Zitat Sood, S., Sarje, A., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618.CrossRef Sood, S., Sarje, A., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618.CrossRef
33.
Zurück zum Zitat Wu, S. H., Zhu, Y. F., & Pu, Q. (2012). Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks, 5(2), 236–248.CrossRef Wu, S. H., Zhu, Y. F., & Pu, Q. (2012). Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks, 5(2), 236–248.CrossRef
34.
Zurück zum Zitat Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.CrossRef Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.CrossRef
37.
Zurück zum Zitat Deebak, B. D., Muthaiah, R., Thenmozhi, K., & Swaminathan, P. (2014). Evaluating three party authentication and key agreement protocol using IP multimedia server–client. Wireless Personal Communications, 81(1), 77–99.CrossRef Deebak, B. D., Muthaiah, R., Thenmozhi, K., & Swaminathan, P. (2014). Evaluating three party authentication and key agreement protocol using IP multimedia server–client. Wireless Personal Communications, 81(1), 77–99.CrossRef
Metadaten
Titel
Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems
verfasst von
Bakkiam David Deebak
Publikationsdatum
01.04.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2621-x

Weitere Artikel der Ausgabe 3/2016

Wireless Personal Communications 3/2016 Zur Ausgabe

Neuer Inhalt