Password based Secure Authentication Methodology for Wireless Sensor Network

Gul N. Khan, M. Zulfiker Ali

2013

Abstract

Wireless Sensor Network (WSN) is a promising solution for next generation real-time monitoring applications due to its ubiquitous nature, ease of deployment and wide range of applications. The main requirements of a secure WSN architecture are confidentiality, integrity and authentication. User Authentication for wireless sensor networks is a fundamental issue in designing secure WSN systems, where legitimate users are allowed to login and access data from the sensor and gateway nodes. A large number of dynamic strong password and two-factor authentication solutions have been proposed. However, all of these protocols rely on network synchronization and suffer from replay and many logged in users with same login ID threats. We present a secure authentication protocol that avoids replay and multiple login attacks. Our scheme eliminates the need for network synchronization. The scheme is analysed and evaluated for various attacks using SystemC and it provides enhanced security for no extra computing at sensor nodes.

References

  1. Benenson, Z., Gartner, F., & Kesdogan, D., (2004). User authentication in sensor networks, In Proc. Workshop on Sensor Networks. Informatik.
  2. Benenson, Z., Gedicke N., & Raivio, O., (2005). Realizing robust user authentication in sensor networks, In Proc. Workshop Real-World Wireless Sensor Networks, Stockholm.
  3. Das, M. L., (2009). Two-factor user authentication in wireless sensor networks, IEEE Trans. Wireless Communication, 8, 1086-1090.
  4. IEEE Standard, 802.15.4-2003, (2003). Wireless medium access control and physical layer specifications for low-rate wireless personal area networks.
  5. Khan, M. K., & Alghathbar, K., (2010). Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks, Sensors, 10(3) 2450-2459.
  6. Ko, L. C., (2008). A novel dynamic user authentication scheme for wireless sensor networks," In Proc. IEEE ISWCS, 608-612, Reykjavik Iceland.
  7. Lee, T. H., (2008). Simple dynamic user authentication protocols for wireless sensor networks, IEEE Sensor Communication, 43, 657-660.
  8. Sastry, N., & Wagner, D., (2004). Security considerations for IEEE 802.15.4 networks, In Proc. ACM Workshop on Wireless Security, 32-42.
  9. SystemC. The language for system-level modeling, design & verification, IEEE Std. 1666-2011. Retrieved from http://www.accellera.org/downloads/standards/System C.
  10. Tseng, H. R., Jan R. H., & Yang, W., (2007). An improved dynamic user authentication scheme for wireless sensor networks, In Proc. IEEE GlobeCom. 986-990.
  11. Vaidya, B., Makrakis, D., & Mouftah, H., (2010). Improved two-factor user authentication in wireless sensor networks, In Proc. Int. Wks. Network Assurance & Security Services in Ubiq. Environments, 600-605.
  12. Vaidya, B., Rodrigues, J. J., & Park, J. H., (2009). User authentication schemes with pseudonymity for ubiquitous sensor network in NGN, Int. Journal of Communication Systems, 23, 1201-1222.
  13. Wong, K. H., Zheng, Y, Cao, J., & Wang, S., (2006). A dynamic user authentication scheme for wireless sensor networks, In Proc. IEEE SUTC, 1, 318-327.
  14. Zhou, X., Xiong, Y., Miao F., & Li, M., (2011). A new dynamic user authentication scheme using smart cards for wireless sensor network, In Proc. IEEE Int. Conf. Computing, Control and Industrial Engineering, 1-4.
Download


Paper Citation


in Harvard Style

N. Khan G. and Ali M. (2013). Password based Secure Authentication Methodology for Wireless Sensor Network . In Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-8565-43-3, pages 35-41. DOI: 10.5220/0004307400350041


in Bibtex Style

@conference{peccs13,
author={Gul N. Khan and M. Zulfiker Ali},
title={Password based Secure Authentication Methodology for Wireless Sensor Network},
booktitle={Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2013},
pages={35-41},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004307400350041},
isbn={978-989-8565-43-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - Password based Secure Authentication Methodology for Wireless Sensor Network
SN - 978-989-8565-43-3
AU - N. Khan G.
AU - Ali M.
PY - 2013
SP - 35
EP - 41
DO - 10.5220/0004307400350041