Advertisement

Anonymity Preserving Authentication and Key Agreement Scheme for Wireless Sensor Networks

  • Deepti SinghEmail author
  • Samayveer Singh
  • Bijendra Kumar
  • Satish Chand
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 958)

Abstract

The main purpose of our paper is to design efficient smartcard based authentication and session key agreement scheme for wireless sensor networks. Our scheme uses registration phase for both user and sensor nodes. We analyze security and simulation results using AVISPA shows that our scheme is secure against attacks.

Keywords

Wireless sensor network Authentication Hash function Smart card Formal verification AVISPA 

References

  1. 1.
    Turkanovic, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96–112 (2014)CrossRefGoogle Scholar
  2. 2.
    Watro, R., Kong, D., Cuti, S.-F., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64 (2004)Google Scholar
  3. 3.
    Xu, J., Zhu, W.-T., Feng, D.-G.: An improved smart card based password authentication scheme with provable security. Comput. Stand. Interface 31, 723–728 (2009)CrossRefGoogle Scholar
  4. 4.
    Singh, S., Chand, S., Kumar, B.: Heterogeneous HEED protocol for wireless sensor networks. Wirel. Pers. Commun. 77, 2117–2139 (2014)CrossRefGoogle Scholar
  5. 5.
    Wong, K., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trust worthy Computing, vol. 1, pp. 8–17 (2006)Google Scholar
  6. 6.
    Vaidya, B., Silva, J.S., Rodrigues, J.J.: Robust dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 88–91 (2009)Google Scholar
  7. 7.
    Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10, 2450–2459 (2010)CrossRefGoogle Scholar
  8. 8.
    Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5), 1646–1656 (2012)CrossRefGoogle Scholar
  9. 9.
    Turkanovic, M., Hölbl, M.: An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektronika Ir Elektrotechnika 19(6), 109–116 (2013)CrossRefGoogle Scholar
  10. 10.
    Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36, 58–80 (2016)CrossRefGoogle Scholar
  11. 11.
    Farash, M.S., Turkanovic, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. AdHoc Netw. 36, 152–176 (2016)Google Scholar
  12. 12.
    Manju, Chand, S., Kumar, B.: Selective α-coverage based heuristic in wireless sensor networks. Wirel. Pers. Commun. 97(1), 1623–1636 (2017)CrossRefGoogle Scholar
  13. 13.
    Fan, R., di Ping, L., Fu, J.-Q., Pan, X.-Z.: A secure and efficient user authentication protocol for two-tiered wireless sensor networks. In: Proceedings of the Second Pacific-Asia Conference on Circuits, Communications and System (PACCS 2010), vol. 1, pp. 425–428 (2010)Google Scholar
  14. 14.
    Chang, C.C., Le, H.D.: A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 15(1), 357–366 (2016)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., Wei, H.-W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)CrossRefGoogle Scholar
  16. 16.
    Tseng, H.-R., Jan, R.-H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the Global Telecommunications Conference (GLOBECOM 2007), vol. 1276, pp. 986–990 (2007)Google Scholar
  17. 17.
    Singh, S., Chand, S., Kumar, B.: Multilevel heterogeneous network model for wireless sensor networks. Telecommun. Syst. 64(2), 259–277 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Deepti Singh
    • 1
    Email author
  • Samayveer Singh
    • 2
  • Bijendra Kumar
    • 1
  • Satish Chand
    • 3
  1. 1.Department of Computer EngineeringNetaji Subhas Institute of TechnologyNew DelhiIndia
  2. 2.Department of Computer Science EngineeringBennett UniversityGreater NoidaIndia
  3. 3.School of Computer and System SciencesJawaharlal Nehru UniversityNew DelhiIndia

Personalised recommendations