User Authentication with Distributed Cluster Formation in Wireless Sensor Networks

  • Dong-Hoon Kim
  • Youn-Sik Hong
  • Ki Young Lee
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 301)


Security is an important aspect of any system and its development has enhanced widespread adoption of WSNs. In a typical situation, user wants to access the data directly from a node instead of accessing at the gateway or at the backend of an application system. Therefore, it is necessary that such an access is allowed only to a registered user. We present a user authentication scheme with distributed cluster formation in WSNs. This scheme works as a ring structure and uses one-way communication. In our protocol, three distinct components, gateway, user, and node, can mutually authenticate each other. In addition, we use S/Key algorithm as one-time password for authentication. Our analysis shows that our proposed scheme is as robust as conventional 4-way authentication scheme, while the communication overhead is substantially decreased.


S/Key algorithm 3-way chaining authentication Wireless sensor networks Cluster formation 


  1. 1.
    Wong K, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), pp 244–251Google Scholar
  2. 2.
    Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. IEEE Globecom’07, pp 986–990Google Scholar
  3. 3.
    Vaidya B, Rodrigues J, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int J Commun Syst 23(9–10):1201–1220CrossRefGoogle Scholar
  4. 4.
    Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRefGoogle Scholar
  5. 5.
    Arikumar KS, Thirumoorthy K (2011) Improved user authentication in wireless sensor networks. In: Proceedings of ICETECT 2011, pp 1010–1015Google Scholar
  6. 6.
    Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. IEEE 6th international conference of wireless and mobile computing, networking and communications (WiMob), pp 600–606Google Scholar
  7. 7.
    Haller N (1994) The S/KEY one-time password system. In: Proceedings of the ISOC symposium on network and distributed system security, San Diego, CAGoogle Scholar
  8. 8.
    Agarwal S, Rungta A, Padmavathy R, Shankar M, Rajan N (2012) An improved fast and secure hash algorithm. J Inf Process Syst 8(1):119–132Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Department of Information and Telecommunication EngineeringIncheon National UniversityIncheonKorea
  2. 2.Department of Computer Science and EngineeringIncheon National UniversityIncheonKorea

Personalised recommendations