A secure user authentication protocol for sensor network in data capturing

Sensor network is an important approach of data capturing. User authentication is a critical security issue for sensor networks because sensor nodes are deployed in an open and unattended environment, leaving them possible hostile attack. Some researchers proposed some user authentication protocols using one-way hash function or using biometric technology. Recently, Yel et al. and Wenbo et al. proposed a user authentication protocols using elliptic curves cryptography. However, there are some security weaknesses for these protocols. In the paper, we review several proposed user authentication protocols, with a detail review of the Wenbo et al.’s user authentication protocol and a cryptanalysis of this protocol that shows several security weaknesses. Furthermore, we propose a secure user authentication protocol using identity-based cryptography to overcome those weaknesses. Finally, we present the security analysis, a comparison of security, computation, and performance for the proposed protocols, which shows that this user authentication protocol is more secure and suitable for higher security WSNs.

[1]  Zhou Quan,et al.  Trusted transport mode based cluster-merkle-tree for wireless sensor networks , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[2]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[3]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[4]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[5]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[6]  Changjun Jiang,et al.  A biometric-based user authentication for wireless sensor networks , 2010, Wuhan University Journal of Natural Sciences.

[7]  Viktor Mayer-Schönberger,et al.  The Rise of Big Data: How It’s Changing the Way We Think about the World , 2014 .

[8]  Chi-Kwong Chan,et al.  Cryptanalysis of a modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..

[9]  Peng Gong,et al.  A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2013, Int. J. Distributed Sens. Networks.

[10]  Quan Zhou,et al.  Trusted architecture for farmland wireless sensor networks , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Mznah Al-Rodhaan,et al.  An Efficient Biometric Authentication Protocol for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[13]  W. Han Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, IACR Cryptol. ePrint Arch..

[14]  Lee-Chun Ko,et al.  A novel dynamic user authentication scheme for wireless sensor networks , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.

[15]  Mun-Kyu Lee,et al.  Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks , 2009, IACR Cryptol. ePrint Arch..

[16]  Wei-Kuan Shih,et al.  A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .

[17]  Ashutosh Saxena,et al.  A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.

[18]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[19]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[20]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[21]  Jong Hyuk Park,et al.  User authentication schemes with pseudonymity for ubiquitous sensor network in NGN , 2010, Int. J. Commun. Syst..

[22]  Eun-Jun Yoon,et al.  A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks , 2011, 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[23]  Muhammad Khurram Khan,et al.  Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks' , 2010, AST/UCMA/ISA/ACN.

[24]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.