A biometric-based user authentication for wireless sensor networks

Article

Abstract

This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. The protocol employs biometric keys and resists the threats of stolen verifier, of which many are logged-in users with the same login identity, guessing, replay, and impersonation. The protocol uses only Hash function and saves the computational cost, the communication cost, and the energy cost. In addition, the user’s password can be changed freely using the proposed protocol.

Key words

authentication biometrics security wireless sensor networks 

CLC number

TP 309 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Chong C Y, Kumar S. Sensor networks: Evolution, opportunities and challenges[J]. Proceedings of IEEE, 2003, 91(8): 1247–1256.CrossRefGoogle Scholar
  2. [2]
    Li C T. An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards[C]//The 5th International Conference on Information Assurance and Security, Xi’an: IEEE Computer Society, 2009: 517–520.CrossRefGoogle Scholar
  3. [3]
    Hwang M S, Liu C Y. Authenticated encryption schemes: Current status and key issues[J]. International Journal of Network Security, 2005, 1(2): 61–73.Google Scholar
  4. [4]
    Kim M, Koc C K. A simple attack on a recently introduced hash-based strong-password authentication scheme[J]. International Journal of Network Security, 2005, 1(2): 77–80.Google Scholar
  5. [5]
    Lee N Y, Chiu Y C. Improved remote authentication scheme with smart card[J]. Computer Standards and Interfaces, 2005, 27(2): 177–180.CrossRefGoogle Scholar
  6. [6]
    Daemen J, Rijndael R V. The advanced encryption standard[J]. Dr. Dobb’s Journal, 2001, 26(3): 137–139.Google Scholar
  7. [7]
    Khan M K, Zhang J. Improving the security of a flexible biometrics remote user authentication scheme[J]. Computer Standards and Interfaces, 2007, 29(1): 82–85.CrossRefGoogle Scholar
  8. [8]
    Khan M K, Zhang J, Wang X. Chaotic Hash-based fingerprint biometric remote user authentication scheme on mobile devices[J]. Chaos, Solitons and Fractals, 2008, 35(3): 519–524.CrossRefGoogle Scholar
  9. [9]
    Li C T, Hwang M S. An efficient biometrics-based remote user authentication scheme using smart cards[J]. Journal of Network and Computer Applications, 2010, 33(1): 1–5.MATHCrossRefGoogle Scholar
  10. [10]
    Perrig A, Szewczyk R, Wen V, et al. SPINS: Security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521–534.MATHCrossRefGoogle Scholar
  11. [11]
    Sastry N, Wagner D. Security considerations for IEEE 802.15.4 Networks[C]//ACM Workshop Wireless Security. Philadelphia: ACM Press, 2004: 32–42.Google Scholar
  12. [12]
    Karlof C, Sastry N, Wagner D. TinySec: A link layer security architecture for wireless sensor networks[C]//International Conference Embedded Networked Sensor Systems. Baltimore: ACM Press, 2004: 162–175.CrossRefGoogle Scholar
  13. [13]
    Watro R, Kong D, Cuti S, et al. TinyPK: Securing sensor networks with public key technology[C]//ACM Workshop Security of Ad Hoc Sensor Networks. Washington D C: ACM Press, 2004: 59–64.CrossRefGoogle Scholar
  14. [14]
    Wong K, Zheng Y, Cao J, et al. A dynamic user authentication scheme for wireless sensor networks[C]//IEEE International Conference Sensor Networks, Ubiquitous, Trustworthy Computing, Taibei: IEEE Computer Society, 2006: 244–251.CrossRefGoogle Scholar
  15. [15]
    Lee J K, Ryu S R, Yoo K Y. Fingerprint-based remote user authentication scheme using smart cards[J]. Electronic Letters, 2002, 38(12): 554–555.CrossRefGoogle Scholar
  16. [16]
    Lin C H, Lai Y Y. A Flexible biometrics remote user authentication scheme[J]. Computer Standards and Interfaces, 2004, 27(1): 19–23.CrossRefGoogle Scholar

Copyright information

© Wuhan University and Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  1. 1.School of Electronics and Information EngineeringTongji University / Key Laboratory of Embedded System and Service Computing of Ministry of EducationShanghaiChina

Personalised recommendations