A New User Authentication Scheme for Hierarchical Wireless Sensor Networks
(*) Corresponding author
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)
Recently, Das et al. proposed a new password-based user authentication scheme in hierarchical wireless sensor networks and claimed this scheme is security against different kinds of attack. However, in this paper, we analyze their scheme and show that their scheme has some pitfalls and can be more efficient through optimize the authentication process. Then we propose an enhanced scheme to overcome the inherent weakness. The enhanced scheme achieves more secure and efficient in WSNs.
Copyright © 2013 Praise Worthy Prize - All rights reserved.
A. K. Das, P. Sharma, S. Chatterjee and J. K. Sing, “A dynamic password-based user authentication scheme for hierarchical wireless sensor networks,” Journal of Network and Computer Applications, Vol. 35, pp. 1646-1656, 2012.
Z. Benenson, F. Gartner, and D. Kesdogan. “User authentication insensor networks," in Proc. Workshop Sensor Networks, Lecture NotesInformatics Proceedings Informatik, pp.385-289, 2004
R. Watro, K. Derrick, C. Sue-fen, G. Charles, L. Charles, K. Peter, “TinyPK: Securing Sensor Networks with Public Key Technology,” In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, Washington, DC, USA, pp. 59-64, 2004
K.H.M. Wong, Y. Zhen, J. Cao, S. Wang, “A Dynamic User Authentication Scheme for Wireless Sensor Networks”, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, 2006.
M. L. Das, "Two-Factor User Authentication in Wireless Sensor Networks" IEEE Trans. Wireless Comm. Vol 8, pp. 1086-1090, 2009
M. K. Khan, and K. Alghathbar, "Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’", Sensors, Vol 10, n.3, pp. 2450-2459, 2010
H.F. Huang, Y.F. Chang, C.H. Liu, “Enhancement of two-factor user authentication in wireless sensor networks”, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, pp. 27-30, 2010
D. Nyang, M.K. Lee, “Improvement of Das’s two-factor authentication protocol in wireless sensor networks”, In: Cryptology ePrint Archive, Report 2009/631: 2009.
D. He, Y. Gao, S. Chan, C. Chen, J. Bu, “An enhanced two-factor user authentication scheme in wireless sensor networks”, Ad Hoc & Sensor Wireless Networks, Vol. 0, pp.1-11, 2010.
- There are currently no refbacks.
Please send any question about this web site to firstname.lastname@example.org
Copyright © 2005-2022 Praise Worthy Prize