Conference Paper

Lecture Notes in Computer Science

DOI: 10.1007/978-3-642-13577-4_5 Conference: Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings
Source: DBLP


Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to their un-attended and hostile deployments. Usually, sensor nodes are equipped with limited computing power, storage, and communication module, thus authenticating remote users in such resource-constrained environment is a critical security concern. Recently, M.L Das proposed a two-factor user authentication scheme in WSN and claimed that his scheme is secure against different kind of attacks. However, in this paper, we prove that M.L Das-scheme has some critical security pitfalls and is not recommended for real application. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack.

4 Reads
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
    Sensors 12/2011; 11(5):4767-79. DOI:10.3390/s110504767 · 2.25 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: This paper describe the design of a Lite-IDE based hierarchical node authentication protocol. The proposed protocol is to solve problem of energy imbalance. The proposed method is Lite-IDE based authentication scheme is proposed for node authentication, which needs to exchange the authentication messages, and key generation. We provided complexity and energy cost analysis of our protocols and show that our protocols are more energy efficient and suitable for WSN.
    2013 Ninth International Conference on Computational Intelligence and Security (CIS); 12/2013
  • 12/2015; 4(1). DOI:10.1186/s13677-015-0030-z