skip to main content
10.1145/1641944.1641962acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
poster

Robust dynamic user authentication scheme for wireless sensor networks

Published: 28 October 2009 Publication History

Abstract

In recent years, wireless sensor networks (WSNs) have been widely used in different domains. For instance, WSNs can be deployed in insecure and unattended environments. In this regard, user authentication is a critical issue for WSNs. In this paper, we propose a user authentication protocol in WSNs, which is variation of strong-password based solution proposed by Wong et al. The proposed protocol is evaluated and compared with the previous schemes.

References

[1]
Benenson, Z., Gedicke, N., and Raivio, O. 2005. Realizing Robust User Authentication in Sensor Networks. In Proceedings of Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Sweden, June 2005.
[2]
Wong, K. H. M., Zheng, Y., Cao J., and Wang, S. 2006. A dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06) Jun. 2006; 1: 318--327.
[3]
Jiang, C., Li, B., and Xu, H. 2007. An Efficient Scheme for User Authentication in Wireless Sensor Networks. In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007.
[4]
Tseng, H. R., Jan, R. H., and Yang, W. 2007. An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM'07), Nov. 2007; 986--990.
[5]
Das, M. L., Saxena, A., and Gulati, V. P. 2004. A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics, May 2004; 50(2):629--631.
[6]
Yoon, E. J., Ryu, E. K., and Yoo, K. Y. 2005. An improvement of Hwang Lee Tang's simple remote user authentication scheme. Elsevier Computers&Security, Feb. 2005; 24(1):50--56.
[7]
Wang, Y. Y., Liu, J. Y., Xiao, F. X., and Dan, J. 2009. A more efficient and secure dynamic ID-based remote user authentication scheme. Elsevier Computer Communications, 2009.

Cited By

View all
  • (2023)A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoTEURASIP Journal on Information Security10.1186/s13635-023-00138-z2023:1Online publication date: 8-Mar-2023
  • (2021)Cluster-Based Classical Routing Protocols and Authentication Algorithms in WSN: A Survey Based on Procedures and MethodsWireless Personal Communications10.1007/s11277-021-09265-7123:3(2777-2833)Online publication date: 16-Nov-2021
  • (2020)Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM48794.2020.9001674(1-4)Online publication date: Jan-2020
  • Show More Cited By

Index Terms

  1. Robust dynamic user authentication scheme for wireless sensor networks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        Q2SWinet '09: Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
        October 2009
        120 pages
        ISBN:9781605586199
        DOI:10.1145/1641944
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 28 October 2009

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. strong-password based authentication
        2. user authentication
        3. wireless sensor network

        Qualifiers

        • Poster

        Conference

        MSWiM '09
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 46 of 131 submissions, 35%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 16 Oct 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoTEURASIP Journal on Information Security10.1186/s13635-023-00138-z2023:1Online publication date: 8-Mar-2023
        • (2021)Cluster-Based Classical Routing Protocols and Authentication Algorithms in WSN: A Survey Based on Procedures and MethodsWireless Personal Communications10.1007/s11277-021-09265-7123:3(2777-2833)Online publication date: 16-Nov-2021
        • (2020)Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM48794.2020.9001674(1-4)Online publication date: Jan-2020
        • (2020)On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor NetworksProceedings of the Fifth International Conference on Mathematics and Computing10.1007/978-981-15-5411-7_1(1-17)Online publication date: 26-Nov-2020
        • (2020)Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networksComputational Science and Technology10.1007/978-981-15-0058-9_33(341-349)Online publication date: 2020
        • (2019)An improved user authentication protocol for wireless sensor networksTransactions on Emerging Telecommunications Technologies10.1002/ett.374530:10Online publication date: 15-Oct-2019
        • (2018)Anonymity Preserving Authentication and Key Agreement Scheme for Wireless Sensor NetworksFuturistic Trends in Network and Communication Technologies10.1007/978-981-13-3804-5_36(484-495)Online publication date: 25-Dec-2018
        • (2017)Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of ThingsInformation10.3390/info80401368:4(136)Online publication date: 30-Oct-2017
        • (2017)User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder TheoremSecurity in Computing and Communications10.1007/978-981-10-6898-0_7(79-94)Online publication date: 10-Nov-2017
        • (2017)User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU DecompositionSecurity in Computing and Communications10.1007/978-981-10-6898-0_4(39-53)Online publication date: 10-Nov-2017
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media