Skip to main content
Log in

An efficient mutual authentication and key agreement scheme without password for wireless sensor networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) are usually deployed in hostile or unattended areas, and users need to obtain real-time data from WSNs. The data collected by sensor nodes are usually relatively private and sensitive, so users must pass the identity authentication before obtaining the information perceived by sensor nodes. In order to enhance the security of wireless sensor networks and prevent illegal users from accessing sensor nodes, this paper designs an efficient and secure identity authentication protocol for wireless sensor networks. The proposed protocol makes full use of the advantages of lightweight cryptographic primitives such as physical unclonable function, one-way hash function and bitwise exclusive operation. Moreover, users only need to use biometrics (such as fingerprints, iris) to access the remote systems and do not need to rely on any password, which avoids the trouble of memorizing and losing password. To prove the scheme’s security, the well-known formal security proof with random oracle model and traditional heuristic discussion are given. Additionally, the performance comparison results show that our scheme has less communication overhead and computation complexity, and is effective for the resource constrained sensor devices in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Younsung C, Donghoon L, Jiye K, Jaewook J, Junghyun N, Dongho W (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081–10106

    Article  Google Scholar 

  2. Prosanta G, Tzonelih H (2016) Bsn-care: a secure iot-based modern healthcare system using body sensor network. IEEE Sens J 16(5):1368–1376

    Article  Google Scholar 

  3. Ding W, Wenting L, Ping W (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 14(9):4081–4092

    Article  Google Scholar 

  4. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090

    Article  Google Scholar 

  5. Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three party secure data transmission in iot networks through design of a lightweight authenticated key agreement scheme. Future Gener Comput Syst Int J ESci 100:882–892

    Article  Google Scholar 

  6. Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SH, Gope P (2017) Efficient authentication protocol for secure multimedia communications in iot-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325

    Article  Google Scholar 

  7. Chen CC, Le HD (2016) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357–366

    Article  MathSciNet  Google Scholar 

  8. Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5

    Article  Google Scholar 

  9. Das AK (2011) Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. Iet Inf Secur 5(3):145–151

    Article  Google Scholar 

  10. An Y (2012) Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. J Biomed Biotechnol. https://doi.org/10.1155/2012/519723

    Article  Google Scholar 

  11. Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497

    Google Scholar 

  12. Khan MK, Kumari S (2013) An improved biometrics-based remote user authentication scheme with user anonymity. BioMed Res Int. https://doi.org/10.1155/2013/491289

    Article  Google Scholar 

  13. S Ibjaoun, EKA Abou, V Poirriez, AO Abdellah, DM Mina (2016) Analysis and enhancements of an efficient biometric-based remote user authentication scheme using smart cards. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). IEEE, Agadir, Morocco, pp 1–8

  14. Turkanovic M, Brumen B, Hoelbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112

    Article  Google Scholar 

  15. Amin R, Biswas GP (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80

    Article  Google Scholar 

  16. Chaturvedi A, Mishra D, Jangirala S, Mukhopadhyay S (2017) A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme. J Inf Secur Appl 32:15–26

    Google Scholar 

  17. Das AK, Mohammad W, Kumar N, Khan MK, Choo KKR, Park Y (2018) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inf 22(4):1310–1322

    Article  Google Scholar 

  18. Gope P, Das AK, Kumar N, Cheng Y (2019) Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inform 15(9):4957–4968

    Article  Google Scholar 

  19. Bian W, Gope P, Cheng Y, Li Q (2020) Bio-aka: an efficient fingerprint based two factor user authentication and key agreement scheme. Future Gen Comput Syst 109:45–55

    Article  Google Scholar 

  20. Qi M, Chen J, Chen Y (2018) A secure biometrics-based authentication key exchange protocol for multi-server tmis using ecc. Comput Methods Progr Biomed 164:101–109

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianhua Chen.

Ethics declarations

Conflict of interest

Author Yulei Chen declares that she has no conflict of interest. Author Jianhua Chen declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, Y., Chen, J. An efficient mutual authentication and key agreement scheme without password for wireless sensor networks. J Supercomput 77, 13653–13675 (2021). https://doi.org/10.1007/s11227-021-03820-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03820-6

Keywords

Navigation