Abstract
Wireless sensor networks (WSNs) are usually deployed in hostile or unattended areas, and users need to obtain real-time data from WSNs. The data collected by sensor nodes are usually relatively private and sensitive, so users must pass the identity authentication before obtaining the information perceived by sensor nodes. In order to enhance the security of wireless sensor networks and prevent illegal users from accessing sensor nodes, this paper designs an efficient and secure identity authentication protocol for wireless sensor networks. The proposed protocol makes full use of the advantages of lightweight cryptographic primitives such as physical unclonable function, one-way hash function and bitwise exclusive operation. Moreover, users only need to use biometrics (such as fingerprints, iris) to access the remote systems and do not need to rely on any password, which avoids the trouble of memorizing and losing password. To prove the scheme’s security, the well-known formal security proof with random oracle model and traditional heuristic discussion are given. Additionally, the performance comparison results show that our scheme has less communication overhead and computation complexity, and is effective for the resource constrained sensor devices in WSNs.
Similar content being viewed by others
References
Younsung C, Donghoon L, Jiye K, Jaewook J, Junghyun N, Dongho W (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081–10106
Prosanta G, Tzonelih H (2016) Bsn-care: a secure iot-based modern healthcare system using body sensor network. IEEE Sens J 16(5):1368–1376
Ding W, Wenting L, Ping W (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 14(9):4081–4092
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090
Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three party secure data transmission in iot networks through design of a lightweight authenticated key agreement scheme. Future Gener Comput Syst Int J ESci 100:882–892
Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SH, Gope P (2017) Efficient authentication protocol for secure multimedia communications in iot-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325
Chen CC, Le HD (2016) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357–366
Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5
Das AK (2011) Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. Iet Inf Secur 5(3):145–151
An Y (2012) Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. J Biomed Biotechnol. https://doi.org/10.1155/2012/519723
Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497
Khan MK, Kumari S (2013) An improved biometrics-based remote user authentication scheme with user anonymity. BioMed Res Int. https://doi.org/10.1155/2013/491289
S Ibjaoun, EKA Abou, V Poirriez, AO Abdellah, DM Mina (2016) Analysis and enhancements of an efficient biometric-based remote user authentication scheme using smart cards. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). IEEE, Agadir, Morocco, pp 1–8
Turkanovic M, Brumen B, Hoelbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112
Amin R, Biswas GP (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80
Chaturvedi A, Mishra D, Jangirala S, Mukhopadhyay S (2017) A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme. J Inf Secur Appl 32:15–26
Das AK, Mohammad W, Kumar N, Khan MK, Choo KKR, Park Y (2018) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inf 22(4):1310–1322
Gope P, Das AK, Kumar N, Cheng Y (2019) Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inform 15(9):4957–4968
Bian W, Gope P, Cheng Y, Li Q (2020) Bio-aka: an efficient fingerprint based two factor user authentication and key agreement scheme. Future Gen Comput Syst 109:45–55
Qi M, Chen J, Chen Y (2018) A secure biometrics-based authentication key exchange protocol for multi-server tmis using ecc. Comput Methods Progr Biomed 164:101–109
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Author Yulei Chen declares that she has no conflict of interest. Author Jianhua Chen declares that he has no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, Y., Chen, J. An efficient mutual authentication and key agreement scheme without password for wireless sensor networks. J Supercomput 77, 13653–13675 (2021). https://doi.org/10.1007/s11227-021-03820-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-03820-6