Skip to main content
Log in

An novel anonymous user WSN authentication for Internet of Things

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The proliferation of current wireless networks and devices has been promoting the development of Internet of Things (IoT). Since the devices have low data handling capabilities and limited storage space in IoT environment, authentication between users and servers is essential. In this paper, we briefly introduce two models tailored for the Internet of Things environment and design an authentication protocol for each model, respectively, which has a higher security level and the lower computational consumption compared with some existing authentications for IoT or WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Chen TH (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712

    Article  Google Scholar 

  • Chen Y, Martnez JF, Castillejo P et al (2017) A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth. Wirel Commun Mob Comput 2017(16):1–17

    Google Scholar 

  • Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090

    Article  Google Scholar 

  • Das AK, Sharma P, Chatterjee S et al (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656

    Article  Google Scholar 

  • Fantacci R, Pecorella T, Viti R et al (2014) A network architecture solution for efficient IOT WSN backhauling: challenges and opportunities. Wirel Commun IEEE 21(4):113–119

    Article  Google Scholar 

  • Farash MS, Turkanović M, Kumari S, Hölbl M (2015) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw 36(P1):152–176

    Google Scholar 

  • He D, Gao Y, Chan S et al (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371

    Google Scholar 

  • Jangirala S, Mishra D, Mukhopadhyay S (2016) Secure lightweight user authentication and key agreement scheme for wireless sensor networks tailored for the Internet of Things environment. In: Ray I, Gaur M, Conti M, Sanghi D, Kamakoti V (eds) Information Systems Security. Springer, Cham, pp 45–65

    Chapter  Google Scholar 

  • Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459

    Article  Google Scholar 

  • Li X, Niu J, Liao J et al (2015) Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 28(2):374–382

    Article  Google Scholar 

  • Li X, Niu J, Bhuiyan MZA et al (2017) A robust ECC based provable secure authentication protocol with privacy protection for industrial Internet of Things. IEEE Trans Ind Inform PP(99):1

    Google Scholar 

  • Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw 32(2):17–31

    Article  Google Scholar 

  • Ramesh MV (2014) Design, development, and deployment of a wireless sensor network for detection of landslides. Ad Hoc Netw 13(1):2–18

    Article  Google Scholar 

  • Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE global telecommunications conference. IEEE, pp 986–990

  • Turkanovic M, Hölbl M (2013) An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektron Elektrotech 19(6):109–116

    Google Scholar 

  • Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw 20(2):96–112

    Article  Google Scholar 

  • Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: 2010 IEEE 6th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 600–606

  • Wen F, Li X (2013) An improved dynamic ID-based remote user authentication with key agreement scheme. Comput Electr Eng 38(2):381–387

    Article  Google Scholar 

  • Wen F, Willy S, Yang G (2014) A robust smart card-based anonymous user authentication protocol for wireless communications. Secur Commun Netw 7(6):987–993

    Article  Google Scholar 

  • Wong KHM, Zheng Y, Cao J et al (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing. IEEE, pp 244–251

  • Wu F, Xu L, Kumari S et al (2016) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J Ambient Intell Humaniz Comput 8(1):1–16

    Google Scholar 

  • Xue K, Ma C, Hong P et al (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323

    Article  Google Scholar 

  • Yeh HL, Chen TH, Liu PC et al (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–79

    Article  Google Scholar 

Download references

Acknowledgements

This study was funded by the National Science Foundation of Shandong Province (No. ZR2018LF006).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fengtong Wen.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Communicated by V. Loia.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, X., Wen, F. An novel anonymous user WSN authentication for Internet of Things. Soft Comput 23, 5683–5691 (2019). https://doi.org/10.1007/s00500-018-3226-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3226-6

Keywords

Navigation