Skip to main content
Log in

A secure and efficient user authentication protocol for wireless sensor network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To provide the secure communication in wireless sensor networks (WSNs) is one of the challenging issues as the channel used is wireless. User authentication is a mechanism which is used to provide the secure communication in them. In this paper, it is devised a secure and efficient user authentication protocol using hash function for WSNs. It is formally analyzed the security of the proposed protocol using random oracle model and showed informally that it is resistant to various known attacks. Its security is formally verified using AVISPA tool. Its performance analysis along with the related schemes is evaluated in terms of security features, computational, communication, storage, and energy consumption costs. It has computational cost of 9 ms and storage cost of 30 bytes, which are less than the related schemes. Also it is more secure than them.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Carlson, J., Han, R., Lao, S., Narayan, C., Sanghani, S.: Rapid prototyping of mobile input devices using wireless sensor nodes. In: Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on, pp. 21–29. IEEE (2003)

  2. Chandrakar P, Om H (2017) A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ecc. Computer Communications 110:26–34

    Article  Google Scholar 

  3. Claycomb WR, Shin D (2011) A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 34(1):418–428

    Article  Google Scholar 

  4. Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Personal Communications 82(3):1377–1404

    Article  Google Scholar 

  5. Das AK (2016) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Networking and Applications 9(1):223–244

    Article  Google Scholar 

  6. Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems 30(1):e2933

    Article  Google Scholar 

  7. Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Security and Communication Networks 9(13):2070–2092

    Article  Google Scholar 

  8. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8(3):1086–1090

    Article  Google Scholar 

  9. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Transactions on information theory 29(2):198–208

    Article  MathSciNet  Google Scholar 

  10. Ghahramani, M., Javidan, R., Shojafar, M.: A secure biometric-based authentication protocol for global mobility networks in smart cities. The Journal of Supercomputing pp. 1–27 (2020)

  11. Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics 63(11):7124–7132

    Article  Google Scholar 

  12. He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 10(4):361–371

    Google Scholar 

  13. He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60

    Article  Google Scholar 

  14. He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences 321:263–277

    Article  Google Scholar 

  15. Huang, H.F., Chang, Y.F., Liu, C.H.: Enhancement of two-factor user authentication in wireless sensor networks. In: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on, pp. 27–30. IEEE (2010)

  16. Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Networking and Applications 8(6):1070–1081

    Article  Google Scholar 

  17. Jiang Q, Ma J, Wei F, Tian Y, Shen J, Yang Y (2016) An untraceable temporal-credential-based two-factor authentication scheme using ecc for wireless sensor networks. Journal of Network and Computer Applications 76:37–48

    Article  Google Scholar 

  18. Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering 63:182–195

    Article  Google Scholar 

  19. Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392

    Article  Google Scholar 

  20. Kaur D, Kumar D, Saini KK, Grover HS (2019) An improved user authentication protocol for wireless sensor networks. Transactions on Emerging Telecommunications Technologies 30(10):e3745

    Article  Google Scholar 

  21. Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of a two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459

    Article  Google Scholar 

  22. Kilinc HH, Yanik T (2014) A survey of sip authentication and key agreement schemes. IEEE Communications Surveys & Tutorials 16(2):1005–1023

    Article  Google Scholar 

  23. Ko, L.C.: A novel dynamic user authentication scheme for wireless sensor networks. In: 2008 IEEE International Symposium on Wireless Communication Systems, pp. 608–612. IEEE (2008)

  24. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Annual International Cryptology Conference, pp. 388–397. Springer (1999)

  25. Kumar D, Chand S, Kumar B (2019) Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Journal of Ambient Intelligence and Humanized Computing 10(2):641–660

    Article  Google Scholar 

  26. Kumar D, Chand S, Kumar B (2020) Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. IET Networks 9(6):315–325

    Article  Google Scholar 

  27. Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647

    Article  Google Scholar 

  28. Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems 63:56–75

    Article  Google Scholar 

  29. Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Computer Networks 104:137–154

    Article  Google Scholar 

  30. Lee, T.H.: Simple dynamic user authentication protocols for wireless sensor networks. In: Sensor Technologies and Applications, 2008. SENSORCOMM’08. Second International Conference on, pp. 657–660. IEEE (2008)

  31. Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589–9603

    Article  Google Scholar 

  32. Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks 9:2643–2655

    Article  Google Scholar 

  33. Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, pp. 88–97. ACM (2002)

  34. Niu Y, Wang X (2011) An anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation 16(4):1986–1992

    Article  MathSciNet  Google Scholar 

  35. Otto C, Milenkovic A, Sanders C, Jovanov E (2006) System architecture of a wireless body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia 1(4):307–326

    Google Scholar 

  36. Shnayder, V., Hempstead, M., Chen, B.r., Allen, G.W., Welsh, M.: Simulating the power consumption of large-scale sensor network applications. In: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 188–200. ACM (2004)

  37. Tseng, H.R., Jan, R.H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pp. 986–990. IEEE (2007)

  38. Vaidya B, Rodrigues JJ, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in ngn. International Journal of Communication Systems 23(9–10):1201–1222

    Article  Google Scholar 

  39. Wang D, Wang P (2016) Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE transactions on dependable and secure computing 15(4):708–722

    Google Scholar 

  40. Wang X, Zhao J (2010) An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 15(12):4052–4057

    Article  MathSciNet  Google Scholar 

  41. Wang, X-y., Gao, Y-y..: A switch-modulated method for chaos digital secure communication based on user-defined protocol. Communications in Nonlinear Science and Numerical Simulation 15(1), 99–104 (2010)

  42. Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), pp. 244–251. IEEE (2006)

  43. Wu F, Xu L, Kumari S, Li X (2018) An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications 11(1):1–20

    Article  Google Scholar 

  44. Xing-Yuan W, Da-Peng L (2013) A secure key agreement protocol based on chaotic maps. Chinese Physics B 22(11):110503

    Article  Google Scholar 

  45. Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 36(1):316–323

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Devender Kumar.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, D. A secure and efficient user authentication protocol for wireless sensor network. Multimed Tools Appl 80, 27131–27154 (2021). https://doi.org/10.1007/s11042-021-10950-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10950-9

Keywords

Navigation