Abstract
The proliferation of current wireless networks and devices has been promoting the development of Internet of Things (IoT). Since the devices have low data handling capabilities and limited storage space in IoT environment, authentication between users and servers is essential. In this paper, we briefly introduce two models tailored for the Internet of Things environment and design an authentication protocol for each model, respectively, which has a higher security level and the lower computational consumption compared with some existing authentications for IoT or WSN.
Similar content being viewed by others
References
Chen TH (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712
Chen Y, Martnez JF, Castillejo P et al (2017) A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth. Wirel Commun Mob Comput 2017(16):1–17
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090
Das AK, Sharma P, Chatterjee S et al (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656
Fantacci R, Pecorella T, Viti R et al (2014) A network architecture solution for efficient IOT WSN backhauling: challenges and opportunities. Wirel Commun IEEE 21(4):113–119
Farash MS, Turkanović M, Kumari S, Hölbl M (2015) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw 36(P1):152–176
He D, Gao Y, Chan S et al (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371
Jangirala S, Mishra D, Mukhopadhyay S (2016) Secure lightweight user authentication and key agreement scheme for wireless sensor networks tailored for the Internet of Things environment. In: Ray I, Gaur M, Conti M, Sanghi D, Kamakoti V (eds) Information Systems Security. Springer, Cham, pp 45–65
Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459
Li X, Niu J, Liao J et al (2015) Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 28(2):374–382
Li X, Niu J, Bhuiyan MZA et al (2017) A robust ECC based provable secure authentication protocol with privacy protection for industrial Internet of Things. IEEE Trans Ind Inform PP(99):1
Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw 32(2):17–31
Ramesh MV (2014) Design, development, and deployment of a wireless sensor network for detection of landslides. Ad Hoc Netw 13(1):2–18
Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE global telecommunications conference. IEEE, pp 986–990
Turkanovic M, Hölbl M (2013) An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektron Elektrotech 19(6):109–116
Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw 20(2):96–112
Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: 2010 IEEE 6th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 600–606
Wen F, Li X (2013) An improved dynamic ID-based remote user authentication with key agreement scheme. Comput Electr Eng 38(2):381–387
Wen F, Willy S, Yang G (2014) A robust smart card-based anonymous user authentication protocol for wireless communications. Secur Commun Netw 7(6):987–993
Wong KHM, Zheng Y, Cao J et al (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing. IEEE, pp 244–251
Wu F, Xu L, Kumari S et al (2016) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J Ambient Intell Humaniz Comput 8(1):1–16
Xue K, Ma C, Hong P et al (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323
Yeh HL, Chen TH, Liu PC et al (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–79
Acknowledgements
This study was funded by the National Science Foundation of Shandong Province (No. ZR2018LF006).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
Communicated by V. Loia.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, X., Wen, F. An novel anonymous user WSN authentication for Internet of Things. Soft Comput 23, 5683–5691 (2019). https://doi.org/10.1007/s00500-018-3226-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-018-3226-6