An Improved User Authentication Protocol for Hierarchical Wireless Sensor Networks using Elliptic Curve Cryptography

In wireless sensor network, most of the queries are issued at the base station or gateway node the network. However, there are some critical WSN applications where real-time data are needed. But data at base station may not be real-time because of communication delay or periodic nature of data collection. So, real-time data can be accessed from the sensor nodes directly on demand. Before allowing the user to access real-time data from the sensor node, authentication of user must be ensured. But user authentication in case of wireless sensor network is a very critical task, as sensor nodes are deployed in unattached environment and are prone to possible hostile network attacks. Any authentication protocol in WSN must be designed keeping the fact that sensor nodes have limited computing power, memory, energy and communication capabilities. In this thesis, an improved user authentication protocol based on Elliptic Curve Cryptography (ECC) has been introduced for hierarchical wireless sensor networks (HWSN). This thesis shows that the ECC based protocol is suitable for wireless sensor networks, where higher security is demanded. Besides this the proposed scheme provides mutual authentication and a secret session key for communication between the user and the cluster head. It also provides an option for addition or replacement of cluster head in the network whenever there is a need. Then a comparative study of the proposed scheme with various existing is presented.

[1]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[2]  Juho Kim,et al.  A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[3]  L. Washington Elliptic Curves: Number Theory and Cryptography , 2003 .

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[6]  Peilin Hong,et al.  A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[7]  Fagen Li,et al.  Indentity-based broadcast signcryption , 2008, Comput. Stand. Interfaces.

[8]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[9]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[10]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[11]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[12]  Bo Sheng,et al.  Public-key based access control in sensornet , 2011, Wirel. Networks.

[13]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[14]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[15]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[16]  Sheetal Kalra,et al.  Elliptic curve cryptography: survey and its security applications , 2011, ACAI '11.

[17]  Ashok Kumar Das,et al.  A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..

[18]  Satyajit Banerjee,et al.  Symmetric key based authenticated querying in wireless sensor networks , 2006, InterSense '06.

[19]  Chun Chen,et al.  An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.

[20]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[21]  Wei Wei,et al.  An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks , 2011 .

[22]  Moni Naor,et al.  Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.

[23]  Ibrahima Niang,et al.  A Survey of Access Control Schemes in Wireless Sensor Networks , 2011 .

[24]  Daojing He,et al.  An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks , 2011, Journal of Zhejiang University SCIENCE C.

[25]  Rakesh Maharana,et al.  An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC , 2013 .

[26]  Mun-Kyu Lee,et al.  Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks , 2009, IACR Cryptol. ePrint Arch..

[27]  Chunguang Ma,et al.  On the (in)security of some smart-card-based password authentication schemes for WSN , 2012, IACR Cryptol. ePrint Arch..

[28]  Mohamed Abid,et al.  A lightweight user authentication scheme for Wireless Sensor Networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[29]  Rehana Yasmin,et al.  An efficient authentication framework for wireless sensor networks , 2012 .

[30]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[31]  Omar Cheikhrouhou,et al.  An ID-based user authentication scheme for Wireless Sensor Networks using ECC , 2011, ICM 2011 Proceeding.

[32]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[33]  Behrouz A. Forouzan Cryptography & Network Security , 2007 .

[34]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[35]  Wuu Yang,et al.  A robust user authentication scheme with self-certificates for wireless sensor networks , 2011, Secur. Commun. Networks.

[36]  Lui Sha,et al.  Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.

[37]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[38]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[39]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[40]  Felix C. Freiling,et al.  User Authentication in Sensor Networks , 2004, GI Jahrestagung.

[41]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..