User Authentication for Hiererchical Wireless Sensor Networks

Wireless sensor networks (WSNs) have a vast field of applications, including environment monitoring, battlefield surveillance and target tracking systems. As WSNs are usually deployed in remote or hostile environments and nodes are prone to compromise attacks, the adoption of key management is extremely important. Most queries in WSN applications are issued at the point of the base station or gateway node of the network. However, there is a great need to access the real-time data inside the network from the nodes because the real-time data may no longer be accessed through the base station only but also by the legal user with authority. To support the requirement, recently Das et al. proposed a dynamic password-based user authentication scheme for hierarchical WSNs. The purposes of this paper are to show Das et al.'s scheme has a security problem of password guessing attack with lost smart card and to provide a remedy for the scheme. For this, we will give a security analysis of Das et al.'s scheme focused on the offline password guessing attack with the assumption that the attacker could steal user's smart card and read the memory on it. Then, we will propose a user authentication scheme for hierarchical WSNs to solve the security problem in Das et al.'s scheme. Our scheme inherits the advantages from Das et al.'s scheme but solves the problems in it.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[3]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[4]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[5]  S. Manesis,et al.  A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..

[6]  Ashok Kumar Das,et al.  A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..

[7]  Peilin Hong,et al.  A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[8]  H. T. Mouftah,et al.  Improved two-factor user authentication in wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[9]  Erman Ayday,et al.  A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks , 2012, Ad Hoc Networks.

[10]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[11]  SongRonggong Advanced smart card based password authentication protocol , 2010 .

[12]  Wei-Kuan Shih,et al.  A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .

[13]  Ronggong Song Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.

[14]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[15]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[16]  Chun Chen,et al.  An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.