User Authentication Protocol Based On Chebyshev Polynomial For Wireless Sensor Networks

Aiming at the security problem of external users access to the wireless sensor networks, a new user authentication protocol with a key exchange function under the public-key system was proposed, the protocol based on the Chebyshev polynomials over finite fields have good chaos characteristic, semi-group property and the one-way trapped characteristic. This protocol can achieve the authentication process between user and network base station or sensor nodes, and completes the initialization of session key in the process of authentication. The analysis shows that the proposed protocol can meet the needs of the wireless sensor network for security authentication, and also has a good performance in authentication time, interaction, computational complexity, and security attacks.

[1]  Zhi-hui Li,et al.  Fast algorithms of public key cryptosystem based on Chebyshev polynomials over finite field , 2011 .

[2]  Peilin Hong,et al.  Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .

[3]  Zhang Ming An Improved Dynamic User Authentication Protocol , 2011 .

[4]  Donghoon Lee,et al.  Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.

[5]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[6]  Ashok Kumar Das,et al.  A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[7]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[8]  Ping Li,et al.  A secure chaotic maps-based key agreement protocol without using smart cards , 2012 .

[9]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[10]  Wang Yijun,et al.  IoT Technology and Application , 2012 .

[11]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[12]  Peng Gong,et al.  A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2013, Int. J. Distributed Sens. Networks.