Skip to main content

Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment

  • Chapter
  • First Online:
Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 643))

Abstract

In recent years, Wireless sensor networks (WSN) are extensively exploited in terms of their enormous applicability and are widely used from mere public branches like hospitals, banks, Institutes to defense and research wings of the country. Pointing that it can contain public or private (sensitive) information or both correspondingly which means authentication among user, nodes and gateways is a must based on a trust metric(s) or a common cryptographic key. WSNs act as a beehive of storming information that is continuous or timed periodically. An unsecure network is highly prone to outsider as well as insider attacks and then here comes the role of authentication protocols that act as a shield of defense because traditional security methods are not directly applicable on IOT’s WSNs due to increasing heterogeneity of components. In this paper, We revisit the authentication protocol provided by Amin and Biswas in 2016 and we propose an improved authentication protocol based on two factor namely rabin cryptosystem and hashing that aim to provide enhanced security features with secure common session key generation and address some of the previous un-addressed attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gartner report from. https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016

  2. Wu F, Kumari S, Li X, Shen J, Choo R, Wazis M, Das Ak (2017) An efficient authentication and key agreement protocol for multi-gateway wireless sensor networks. J Netw Comput Appl 89:72–85

    Google Scholar 

  3. Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154

    Article  Google Scholar 

  4. Das AK, Zeadally S, He D (2018) Taxonomy and analysis of security protocols for internet of things. Futur Gener Comput Syst 89:110–125

    Article  Google Scholar 

  5. Watro R, Kong D, Securing sensor networks with public key technology, In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, ACM, pp 59–64

    Google Scholar 

  6. Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10:2450–2459

    Article  Google Scholar 

  7. Wong KHM, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. IEEE International conference on sensor-networks, ubiquitous & trust-worthy computing, p 8

    Google Scholar 

  8. Das ML (2009) Two-factor user authentication in Wireless sensor network IEEE Trans. Wireless Commun 8:1086–1090

    Google Scholar 

  9. Xue K, Ma C, Hong P (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36:316–323

    Article  Google Scholar 

  10. Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95

    Article  Google Scholar 

  11. Das AK (2012) A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int J Inf Secur 11(3):189–211

    Article  Google Scholar 

  12. Turkanovic M, Brumen B, Holbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112

    Article  Google Scholar 

  13. Farash MS, Turkanovic M, Kumari S, Holbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Network 36:152–176

    Article  Google Scholar 

  14. Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Netw. Appl. 8:1070–1081

    Article  Google Scholar 

  15. Wu F, Xue L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput Electr Eng 45:274–285

    Article  Google Scholar 

  16. Wu F, Kumari S, Li X, Shen J, Choo R, Wazis M, Das Ak (2017) An efficient authentication and key agreement protocol for multi-gateway wireless sensor networks. J Netw Comput Appl 89:72–85

    Article  Google Scholar 

  17. Huang X, Xiang Y, Bertino E, Zhou J, Xu L (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secur Comput 568–581

    Google Scholar 

  18. Yu J, Wang G, Mu Y, Gao W (2014) An efficient generic framework for 3-factor authentication with provably secure instantiation. IEEE Trans Inf Forensics Secur 9(12):2302–2313

    Article  Google Scholar 

  19. Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58:85–95

    Article  Google Scholar 

  20. Srivastava K, Awasthi AK, Kaul SD, Mittal R (2015) A hash based mutual RFID tag authentication protocol in telecare medicine information system. J Med Syst 39(1):153

    Article  Google Scholar 

  21. Phan RC-W (2009) Cryptanalysis of a new ultra lightweight RFID authentication protocols. IEEE Trans Dependable Secur Comput 6(4):316–320

    Article  Google Scholar 

  22. Ouafi K, Phan RC-W (2008) Traceable privacy of recent provably-secure RFID protocols. In: International conference on applied cryptography and network security, Springer, pp 479–489

    Google Scholar 

  23. Amin R, Biswas G (2016) A secure light weight scheme for user authentication and key agreement in multi gateway based wireless sensor networks. Ad Hoc Netw 36:58–80

    Article  Google Scholar 

  24. Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27

    Google Scholar 

  25. Chi Q, Yan H, Zhang C, Pang Z, Da Xu L (2014) A recon_gurable smart sensor interface for industrial WSN in IoT environment. IEEE Trans Industr Inf 10(2):1417–1425

    Article  Google Scholar 

  26. Wang D, Wang P (2014) On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput Netw 73:41–57

    Article  Google Scholar 

  27. Wu F, Kumari S, Li X, Shen J, Wazis M, Das AK (2017) An efficient authentication and key agreement protocol for multi-gateway wireless sensor networks. J Netw Comput Appl 89:72–85

    Google Scholar 

  28. Adat V, Gupta B (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441

    Article  Google Scholar 

  29. Ahlawat P, Dave M (2017) A hybrid approach for path vulnerability matrix on random key predistribution for wireless sensor networks. Wirel Pers Commun 94(4):3327–3353

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ankit Attkan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Attkan, A., Ahlawat, P. (2020). Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment. In: Gunjan, V., Senatore, S., Kumar, A., Gao, XZ., Merugu, S. (eds) Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies. Lecture Notes in Electrical Engineering, vol 643. Springer, Singapore. https://doi.org/10.1007/978-981-15-3125-5_21

Download citation

Publish with us

Policies and ethics