Novel Two Factor User Authentication Scheme over WSNs

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 164)

Abstract

Wireless sensor networks (WSNs) have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics. User authentication in WSNs is a critical security issue due to their unattended and hostile deployment. Recently, Khan and Alghathbar proposed an improved two-factor user authentication (K–A scheme) in WSNs. This paper shows that the K–A scheme is still weak against the user impersonate attack and the password guessing attack and propose a novel two-factor user authentication scheme to fix the susceptibilities to the previous scheme. The proposed scheme could support more security and robustness than the K–A scheme in WSNs.

Keywords

User authentication Two-factor authentication Wireless sensor network 

References

  1. 1.
    Tiwari, A., Ballal, P., Lewis, F.L.: Energy-efficient wireless sensor network design and implementation for condition-based maintenance. ACM Trans. Sens. Netw. 3(1), 1–23 (2007)Google Scholar
  2. 2.
    IEEE 1451, A Standard Smart Transducer Interface, Sensors Expo, Philadelphia, October 2001, http://ieee1451.nist.gov/Workshop_04Oct01/1451_overview.pdf
  3. 3.
    Chong, C.Y., Kumar, S.: Sensor networks: evolution, opportunities, and challenges. Proc IEEE 2003 91(8), 1247–1256 (2003)Google Scholar
  4. 4.
    Warneke, B., Last, M., Liebowitz, B., Pister, K.S.J.: Smart dust communication with a cubic-millimeter. Computer 34(1), 44–51 (2001)CrossRefGoogle Scholar
  5. 5.
    Botts, M., Robin, A.: Bringing the sensor web together. Geosciences 6, 46–53 (2007)Google Scholar
  6. 6.
    Cook, D.J., Das, S.K.: Smart Environments: Technologies, Protocols and Applications. Wiley, New York (2004)CrossRefGoogle Scholar
  7. 7.
    Benenson, Z., Gartner, F., Kesdogam, D.: User authentication in sensor networks. Workshops on Sensor Networks, pp. 385–389 (2004)Google Scholar
  8. 8.
    Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. The 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64 (2004)Google Scholar
  9. 9.
    Tseng, H.R., Jan, R.H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. IEEE Globecom, pp. 986–990 (2007)Google Scholar
  10. 10.
    Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086–1090 (2009)CrossRefGoogle Scholar
  11. 11.
    Nyang, D.H., Lee, M.K.: Improvement of Das’s two-factor authentication protocol in wireless sensor networks. Cryptology ePrint Archive, p. 631 (2009)Google Scholar
  12. 12.
    Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvement of ‘two-factor authentication in wireless sensor networks’. Sensors 10, 2450–2459 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dortdrecht 2012

Authors and Affiliations

  1. 1.School of Computer EngineeringKyungil UniversityKyungsansiKorea
  2. 2.Department of Computer Science and EngineeringEwha UniversitySeoulKorea

Personalised recommendations