Skip to main content

Performance Analysis of User Authentication Schemes in Wireless Sensor Networks

  • Conference paper
  • First Online:
Proceedings of International Conference on Recent Innovations in Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1001))

  • 285 Accesses

Abstract

Wireless sensor networks (WSNs) have a broad range of applications in most of the sectors which require a high level of security. These networks provide sensor data to the external users on a real-time basis; thus, it is a good idea to provide them immediate access. User authentication is an essential requirement to access the services of sensor areas to prevent unauthorized access. The network and data security are key concerns in WSNs for secure and authentic data communication. Thus, an analysis of a secure and efficient data transmission scheme is considered. In this paper, an analysis of existing user authentication schemes is discussed and provides comparative studies of user authentication schemes for network security. An explicitly simulated one of the user authentication schemes by the AVISPA tool is discussed, and its demonstration is also given which shows the resistant to the cryptographic attacks. The lower communication costs are one of the main parameters, i.e., considered to compared with the previous relevant techniques. Moreover, future directions are also discussed for the existing works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ullo SL, Sinha GR (2020) Advances in smart environment monitoring systems using IoT and sensors. Sensors 20(11):3113

    Google Scholar 

  2. Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101

    Google Scholar 

  3. Dammak M et al (2019) Token-based lightweight authentication to secure IoT networks. In: 2019 16th IEEE annual Consumer Communications Networking Conference (CCNC), IEEE

    Google Scholar 

  4. Singh D et al (2019) SMAC-AS: MAC based secure authentication scheme for wireless sensor network. Wireless Personal Commun 107(2):1289–1308

    Google Scholar 

  5. Gupta S, Singhal A, Kapoor A (2016) A literature survey on social engineering attacks: Phishing attack. In: 2016 international conference on computing, communication and automation (ICCCA), IEEE

    Google Scholar 

  6. Ahemd MM, Shah MA, Wahid A (2017) IoT security: a layered approach for attacks defenses. In: 2017 international conference on Communication Technologies (ComTech), IEEE

    Google Scholar 

  7. Ometov A et al (2018) Multi-factor authentication: a survey. Cryptography 2(1):1

    Google Scholar 

  8. Holohan E, Schukat M (2010) Authentication using virtual certificate authorities: a new security paradigm for wireless sensor networks. In: 2010 ninth IEEE international symposium on network computing and applications, IEEE

    Google Scholar 

  9. Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1):e2933

    Article  Google Scholar 

  10. Dahia G, Jesus L, Segundo MP (2020) Continuous authentication using biometrics: an advanced review. Wiley Interdisc Rev: Data Mining Knowl Discovery 10(4):e1365

    Google Scholar 

  11. Park YY, Choi Y, Lee K (2014) A study on the design and implementation of facial recognition application system. Int J Bio-Sci Bio-Technol 6(2):1–10

    Google Scholar 

  12. Yang C-C, Wang R-C, Liu W-T (2005) Secure authentication scheme for session initiation protocol. Comput Security 24(5):381–386

    Article  Google Scholar 

  13. Knox DA, Kunz T (2015) Wireless fingerprints inside a wireless sensor network. ACM Trans Sensor Netw (TOSN) 11(2):1–30

    Article  Google Scholar 

  14. Sahidullah M, Kinnunen T (2016) Local spectral variability features for speaker verification. Digital Signal Process 50:1–11

    Google Scholar 

  15. Imran M, Said AM, Hasbullah H (2010) A survey of simulators, emulators and testbeds for wireless sensor networks. In: 2010 international symposium on information technology, vol 2, IEEE

    Google Scholar 

  16. El-said SA, Hassanien AE (2013) Artificial eye vision using wireless sensor networks. In: Wireless Sensor Networks: Theory and Applications. CRC Press, Taylor and Francis Group, Boca Raton

    Google Scholar 

  17. Tanuja R et al (2015) Token based privacy preserving access control in wireless sensor networks. In: 2015 International Conference on Advanced Computing and Communications (ADCOM), IEEE

    Google Scholar 

  18. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wireless Commun 8(3):1086–1090

    Article  Google Scholar 

  19. Chang C-C, Le H-D (2015) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wireless Commun 15(1):357–366

    Article  Google Scholar 

  20. Banerjee S et al (2019) An enhanced and secure biometric based user authentication scheme in wireless sensor networks using smart cards. Wireless Personal Commun 107(1):243–270

    Google Scholar 

  21. Xie Q et al (2021) A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP J Wireless Commun Netw 1:1–17

    Google Scholar 

  22. Singh D, Kumar B, Singh S, Chand S (2020) Evaluating authentication schemes for real-time data in wireless sensor network. Wireless Personal Commun 114(1):629–655

    Article  Google Scholar 

  23. Singh D, Kumar B, Singh S, Chand S, Singh PK (2021) RCBE-AS: rabin cryptosystem–based efficient authentication scheme for wireless sensor networks. In: Personal and ubiquitous computing, pp 1–22

    Google Scholar 

  24. Singh D, Kumar B, Singh S, Chand S (2020) A secure IoT-based mutual authentication for healthcare applications in wireless sensor networks using ECC. Int J Healthcare Inf Syst Informatics (IJHISI) 16(2):21–48

    Article  Google Scholar 

  25. Shuai M et al (2021) A lightweight three-factor anonymous authentication scheme with privacy protection for personalized healthcare applications. J Organizational End User Comput (JOEUC) 33(3):1–18

    Google Scholar 

  26. Xie Q, Ding Z, Hu B (2021) A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things. In: Security and communication networks 2021

    Google Scholar 

  27. Singh D et al (2021) RCBE-AS: rabin cryptosystem–based efficient authentication scheme for wireless sensor networks. In: Personal and ubiquitous computing, pp 1–22

    Google Scholar 

  28. The AVISPA project. http://www.avispaproject.org

  29. Xun Y et al (2019) Automobile driver fingerprinting: a new machine learning based authentication scheme. IEEE Trans Industrial Informatics 16(2):1417–1426

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, R., Singh, S. (2023). Performance Analysis of User Authentication Schemes in Wireless Sensor Networks. In: Singh, Y., Singh, P.K., Kolekar, M.H., Kar, A.K., Gonçalves, P.J.S. (eds) Proceedings of International Conference on Recent Innovations in Computing. Lecture Notes in Electrical Engineering, vol 1001. Springer, Singapore. https://doi.org/10.1007/978-981-19-9876-8_43

Download citation

Publish with us

Policies and ethics