Abstract

User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

Highlights

  • A Secured Authentication Protocol for Wireless SensorHsiu-Lien Yeh 1,*, Tien-Ho Chen 2, Pin-Chuan Liu 2, Tai-Hoo Kim 3 and Hsin-Wen Wei 4

  • As wireless communication technology has matured, the deployment of Wireless Sensor Networks (WSNs) has become more common

  • To address all of the issues raised in the above studies, we propose a novel user authentication protocol for wireless sensor networks, using Elliptic Curves Cryptography (ECC) and smart cards

Read more

Summary

A Secured Authentication Protocol for Wireless Sensor

Hsiu-Lien Yeh 1,*, Tien-Ho Chen 2, Pin-Chuan Liu 2, Tai-Hoo Kim 3 and Hsin-Wen Wei 4. Received: 30 March 2011; in revised form: April 2011 / Accepted: April 2011 /

Introduction
Review of Das’ Scheme
Cryptanalysis of Das’ Protocol
Security Requirements in Wireless Sensor Networks
No Mutual Authentication
No Protection against Insider Attacks
No Protection against Forgery Attacks
ECC Based Authentication Protocol
Registration Phase
Login Phase
Verification Phase
Mutual Authentication Phase
The Password-Changing Phase
Security Analysis
Performance Analysis
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call