Autosoft Journal

Online Manuscript Access

A user authentication protocol combined with trust model, biometrics and ECC for wireless sensor networks



In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model's ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the security and the performance.



Total Pages: 11
Pages: 519-529


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways

Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Volume: 24
Issue: 3
Year: 2018

Cite this document


Adrian Perrig, Robert Szewczyk, J. D. Tygar,et al., (2002). SPINS: security protocols for sensor networks, Journal Wireless Networks, 8(5):521-534.

Burrows M, Abadi M, and Needham R M., (1989). A logic of authentication, Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences. The Royal Society, 426(1871): 233-271

Choi Y, Lee D, Kim J, et al., (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, 14(6): 10081-10106.

Chong C Y & Kumar S, (2003). Sensor networks: Evolution, opportunities and challenges, Proceedings of IEEE. 91(8), 1247-1256.

Das M L., (2009). Two-factor user authentication in wireless sensor networks[J]. Wireless Communications, IEEE Transactions on, 8(3): 1086-1090.

Dorigo M & Blum C., (2005). Ant colony optimization theory: A survey[J]. Theoretical computer science, 344(2): 243-278.

Feng Yue-hua & CHEN Zhou-ji, (2014). The Principle and Application Research on Ant Colony Algorithm Based on Swarm Intelligence[J].Journal of Lanzhou University of Arts and Science(Natural Sciences).28(02):58-62.

Han Qiu-jun & DING Yue-Wei, (2011). Design and Analysis of New Authorization Schemein SaaSMode, Computer Engineering 37(7):133-135

Li C T., (2009). An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards, The 5th International Conference on Information Assurance and Security, Xi”an: IEEE Computer Society, 2009: 517-520.

Long Wei, (2015). Research on Anonymous Identity Authentication Based on Biometrics[D], BEIJING JIAOTONG UNIVERSITY, 2015(4):2-13

Malan, D.J., M. Welsh, and M.D. Smith. "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography." 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004. n. pag. Crossref. Web.

Mármol F G & Pérez G M., (2011). Providing trust in wireless sensor networks using a bio-inspired technique[J]. Telecommunication systems, 46(2): 163-180.

Mármol F G & Pérez G M., (2009). TRMSim-WSN, trust and reputation models simulator for wireless sensor network, Communications, 2009. ICC”09. IEEE International Conference on. IEEE, 2009: 1-5.

Pan Y, Yu Y, and Yan L., (2013). An improved trust model based on interactive ant algorithms and its applications in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013(7):385-388.

Qing Si-han., (2003). Design and Logical Analysis of Security Protocols, Journal of Software, 14(7):1300-1309

Radi M, Dezfouli B, Bakar K A, et al., (2012). Multipath routing in wireless sensor networks: survey and research challenges, Sensors, 2012, 12(1): 650-685.

Syverson Paul F. & Oorschot Paul C.van, (1994). On Unifying Some Cryptographic Protocol Logics[C].Proceedings of the 1994 IEEE Computer Society Symposium on Security and Privacy. Oakland, USA: IEEE Computer Society Press, 1994. pp:14-28

Watro, Ronald et al. "TinyPK." Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN ”04 (2004): n. pag. Crossref. Web.

Wong K H M, Zheng Y, Cao J, et al., (2006). A dynamic user authentication scheme for wireless sensor networks, Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE International Conference on. 2006: 1- 8.

Xue K, Ma C, Hong P, et al., (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, Journal of Network & Computer Applications, 36(1):316-323.

Yeh H L, Chen T H, Liu P C, et al., (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, 11(5): 4767-4779.

Yuan Jianjun, Jiang Changjun, Jiang Zuowen, et al., (2010). A Biometric-Based User Authentication for Wireless Sensor Networks, WuHan University Journal of Natural Sciences, 15 (3): 272-276


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048