Abstract
To provide the secure communication in wireless sensor networks (WSNs) is one of the challenging issues as the channel used is wireless. User authentication is a mechanism which is used to provide the secure communication in them. In this paper, it is devised a secure and efficient user authentication protocol using hash function for WSNs. It is formally analyzed the security of the proposed protocol using random oracle model and showed informally that it is resistant to various known attacks. Its security is formally verified using AVISPA tool. Its performance analysis along with the related schemes is evaluated in terms of security features, computational, communication, storage, and energy consumption costs. It has computational cost of 9 ms and storage cost of 30 bytes, which are less than the related schemes. Also it is more secure than them.
Similar content being viewed by others
References
Carlson, J., Han, R., Lao, S., Narayan, C., Sanghani, S.: Rapid prototyping of mobile input devices using wireless sensor nodes. In: Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on, pp. 21–29. IEEE (2003)
Chandrakar P, Om H (2017) A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ecc. Computer Communications 110:26–34
Claycomb WR, Shin D (2011) A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 34(1):418–428
Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Personal Communications 82(3):1377–1404
Das AK (2016) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Networking and Applications 9(1):223–244
Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems 30(1):e2933
Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Security and Communication Networks 9(13):2070–2092
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8(3):1086–1090
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Transactions on information theory 29(2):198–208
Ghahramani, M., Javidan, R., Shojafar, M.: A secure biometric-based authentication protocol for global mobility networks in smart cities. The Journal of Supercomputing pp. 1–27 (2020)
Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics 63(11):7124–7132
He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 10(4):361–371
He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60
He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences 321:263–277
Huang, H.F., Chang, Y.F., Liu, C.H.: Enhancement of two-factor user authentication in wireless sensor networks. In: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on, pp. 27–30. IEEE (2010)
Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Networking and Applications 8(6):1070–1081
Jiang Q, Ma J, Wei F, Tian Y, Shen J, Yang Y (2016) An untraceable temporal-credential-based two-factor authentication scheme using ecc for wireless sensor networks. Journal of Network and Computer Applications 76:37–48
Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering 63:182–195
Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392
Kaur D, Kumar D, Saini KK, Grover HS (2019) An improved user authentication protocol for wireless sensor networks. Transactions on Emerging Telecommunications Technologies 30(10):e3745
Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of a two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459
Kilinc HH, Yanik T (2014) A survey of sip authentication and key agreement schemes. IEEE Communications Surveys & Tutorials 16(2):1005–1023
Ko, L.C.: A novel dynamic user authentication scheme for wireless sensor networks. In: 2008 IEEE International Symposium on Wireless Communication Systems, pp. 608–612. IEEE (2008)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Annual International Cryptology Conference, pp. 388–397. Springer (1999)
Kumar D, Chand S, Kumar B (2019) Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Journal of Ambient Intelligence and Humanized Computing 10(2):641–660
Kumar D, Chand S, Kumar B (2020) Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. IET Networks 9(6):315–325
Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647
Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems 63:56–75
Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Computer Networks 104:137–154
Lee, T.H.: Simple dynamic user authentication protocols for wireless sensor networks. In: Sensor Technologies and Applications, 2008. SENSORCOMM’08. Second International Conference on, pp. 657–660. IEEE (2008)
Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589–9603
Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks 9:2643–2655
Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, pp. 88–97. ACM (2002)
Niu Y, Wang X (2011) An anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation 16(4):1986–1992
Otto C, Milenkovic A, Sanders C, Jovanov E (2006) System architecture of a wireless body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia 1(4):307–326
Shnayder, V., Hempstead, M., Chen, B.r., Allen, G.W., Welsh, M.: Simulating the power consumption of large-scale sensor network applications. In: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 188–200. ACM (2004)
Tseng, H.R., Jan, R.H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pp. 986–990. IEEE (2007)
Vaidya B, Rodrigues JJ, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in ngn. International Journal of Communication Systems 23(9–10):1201–1222
Wang D, Wang P (2016) Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE transactions on dependable and secure computing 15(4):708–722
Wang X, Zhao J (2010) An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 15(12):4052–4057
Wang, X-y., Gao, Y-y..: A switch-modulated method for chaos digital secure communication based on user-defined protocol. Communications in Nonlinear Science and Numerical Simulation 15(1), 99–104 (2010)
Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), pp. 244–251. IEEE (2006)
Wu F, Xu L, Kumari S, Li X (2018) An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications 11(1):1–20
Xing-Yuan W, Da-Peng L (2013) A secure key agreement protocol based on chaotic maps. Chinese Physics B 22(11):110503
Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 36(1):316–323
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumar, D. A secure and efficient user authentication protocol for wireless sensor network. Multimed Tools Appl 80, 27131–27154 (2021). https://doi.org/10.1007/s11042-021-10950-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10950-9