Abstract
In recent years, Wireless sensor networks (WSN) are extensively exploited in terms of their enormous applicability and are widely used from mere public branches like hospitals, banks, Institutes to defense and research wings of the country. Pointing that it can contain public or private (sensitive) information or both correspondingly which means authentication among user, nodes and gateways is a must based on a trust metric(s) or a common cryptographic key. WSNs act as a beehive of storming information that is continuous or timed periodically. An unsecure network is highly prone to outsider as well as insider attacks and then here comes the role of authentication protocols that act as a shield of defense because traditional security methods are not directly applicable on IOT’s WSNs due to increasing heterogeneity of components. In this paper, We revisit the authentication protocol provided by Amin and Biswas in 2016 and we propose an improved authentication protocol based on two factor namely rabin cryptosystem and hashing that aim to provide enhanced security features with secure common session key generation and address some of the previous un-addressed attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gartner report from. https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016
Wu F, Kumari S, Li X, Shen J, Choo R, Wazis M, Das Ak (2017) An efficient authentication and key agreement protocol for multi-gateway wireless sensor networks. J Netw Comput Appl 89:72–85
Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154
Das AK, Zeadally S, He D (2018) Taxonomy and analysis of security protocols for internet of things. Futur Gener Comput Syst 89:110–125
Watro R, Kong D, Securing sensor networks with public key technology, In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, ACM, pp 59–64
Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10:2450–2459
Wong KHM, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. IEEE International conference on sensor-networks, ubiquitous & trust-worthy computing, p 8
Das ML (2009) Two-factor user authentication in Wireless sensor network IEEE Trans. Wireless Commun 8:1086–1090
Xue K, Ma C, Hong P (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36:316–323
Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95
Das AK (2012) A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int J Inf Secur 11(3):189–211
Turkanovic M, Brumen B, Holbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112
Farash MS, Turkanovic M, Kumari S, Holbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Network 36:152–176
Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Netw. Appl. 8:1070–1081
Wu F, Xue L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput Electr Eng 45:274–285
Wu F, Kumari S, Li X, Shen J, Choo R, Wazis M, Das Ak (2017) An efficient authentication and key agreement protocol for multi-gateway wireless sensor networks. J Netw Comput Appl 89:72–85
Huang X, Xiang Y, Bertino E, Zhou J, Xu L (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secur Comput 568–581
Yu J, Wang G, Mu Y, Gao W (2014) An efficient generic framework for 3-factor authentication with provably secure instantiation. IEEE Trans Inf Forensics Secur 9(12):2302–2313
Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58:85–95
Srivastava K, Awasthi AK, Kaul SD, Mittal R (2015) A hash based mutual RFID tag authentication protocol in telecare medicine information system. J Med Syst 39(1):153
Phan RC-W (2009) Cryptanalysis of a new ultra lightweight RFID authentication protocols. IEEE Trans Dependable Secur Comput 6(4):316–320
Ouafi K, Phan RC-W (2008) Traceable privacy of recent provably-secure RFID protocols. In: International conference on applied cryptography and network security, Springer, pp 479–489
Amin R, Biswas G (2016) A secure light weight scheme for user authentication and key agreement in multi gateway based wireless sensor networks. Ad Hoc Netw 36:58–80
Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27
Chi Q, Yan H, Zhang C, Pang Z, Da Xu L (2014) A recon_gurable smart sensor interface for industrial WSN in IoT environment. IEEE Trans Industr Inf 10(2):1417–1425
Wang D, Wang P (2014) On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput Netw 73:41–57
Wu F, Kumari S, Li X, Shen J, Wazis M, Das AK (2017) An efficient authentication and key agreement protocol for multi-gateway wireless sensor networks. J Netw Comput Appl 89:72–85
Adat V, Gupta B (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441
Ahlawat P, Dave M (2017) A hybrid approach for path vulnerability matrix on random key predistribution for wireless sensor networks. Wirel Pers Commun 94(4):3327–3353
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Attkan, A., Ahlawat, P. (2020). Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment. In: Gunjan, V., Senatore, S., Kumar, A., Gao, XZ., Merugu, S. (eds) Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies. Lecture Notes in Electrical Engineering, vol 643. Springer, Singapore. https://doi.org/10.1007/978-981-15-3125-5_21
Download citation
DOI: https://doi.org/10.1007/978-981-15-3125-5_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3124-8
Online ISBN: 978-981-15-3125-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)