Autosoft Journal

Online Manuscript Access


A user authentication protocol combined with trust model, biometrics and ECC for wireless sensor networks



Abstract

In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model's ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the security and the performance.


Keywords


Pages

Total Pages: 11
Pages: 519-529

DOI
10.31209/2018.100000019


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 24
Issue: 3
Year: 2018

Cite this document


References

Adrian Perrig, Robert Szewczyk, J. D. Tygar,et al., (2002). SPINS: security protocols for sensor networks, Journal Wireless Networks, 8(5):521-534. https://doi.org/10.1023/A:1016598314198

Burrows M, Abadi M, and Needham R M., (1989). A logic of authentication, Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences. The Royal Society, 426(1871): 233-271 https://doi.org/10.1098/rspa.1989.0125

Choi Y, Lee D, Kim J, et al., (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, 14(6): 10081-10106. https://doi.org/10.3390/s140610081

Chong C Y & Kumar S, (2003). Sensor networks: Evolution, opportunities and challenges, Proceedings of IEEE. 91(8), 1247-1256. https://doi.org/10.1109/JPROC.2003.814918

Das M L., (2009). Two-factor user authentication in wireless sensor networks[J]. Wireless Communications, IEEE Transactions on, 8(3): 1086-1090.

Dorigo M & Blum C., (2005). Ant colony optimization theory: A survey[J]. Theoretical computer science, 344(2): 243-278. https://doi.org/10.1016/j.tcs.2005.05.020

Feng Yue-hua & CHEN Zhou-ji, (2014). The Principle and Application Research on Ant Colony Algorithm Based on Swarm Intelligence[J].Journal of Lanzhou University of Arts and Science(Natural Sciences).28(02):58-62.

Han Qiu-jun & DING Yue-Wei, (2011). Design and Analysis of New Authorization Schemein SaaSMode, Computer Engineering 37(7):133-135

Li C T., (2009). An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards, The 5th International Conference on Information Assurance and Security, Xi”an: IEEE Computer Society, 2009: 517-520.

Long Wei, (2015). Research on Anonymous Identity Authentication Based on Biometrics[D], BEIJING JIAOTONG UNIVERSITY, 2015(4):2-13

Malan, D.J., M. Welsh, and M.D. Smith. "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography." 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004. n. pag. Crossref. Web. https://doi.org/10.1109/sahcn.2004.1381904

Mármol F G & Pérez G M., (2011). Providing trust in wireless sensor networks using a bio-inspired technique[J]. Telecommunication systems, 46(2): 163-180. https://doi.org/10.1007/s11235-010-9281-7

Mármol F G & Pérez G M., (2009). TRMSim-WSN, trust and reputation models simulator for wireless sensor network, Communications, 2009. ICC”09. IEEE International Conference on. IEEE, 2009: 1-5.

Pan Y, Yu Y, and Yan L., (2013). An improved trust model based on interactive ant algorithms and its applications in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013(7):385-388. https://doi.org/10.1155/2013/764064

Qing Si-han., (2003). Design and Logical Analysis of Security Protocols, Journal of Software, 14(7):1300-1309

Radi M, Dezfouli B, Bakar K A, et al., (2012). Multipath routing in wireless sensor networks: survey and research challenges, Sensors, 2012, 12(1): 650-685. https://doi.org/10.3390/s120100650

Syverson Paul F. & Oorschot Paul C.van, (1994). On Unifying Some Cryptographic Protocol Logics[C].Proceedings of the 1994 IEEE Computer Society Symposium on Security and Privacy. Oakland, USA: IEEE Computer Society Press, 1994. pp:14-28

Watro, Ronald et al. "TinyPK." Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN ”04 (2004): n. pag. Crossref. Web. https://doi.org/10.1145/1029102.1029113

Wong K H M, Zheng Y, Cao J, et al., (2006). A dynamic user authentication scheme for wireless sensor networks, Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE International Conference on. 2006: 1- 8.

Xue K, Ma C, Hong P, et al., (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, Journal of Network & Computer Applications, 36(1):316-323. https://doi.org/10.1016/j.jnca.2012.05.010

Yeh H L, Chen T H, Liu P C, et al., (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, 11(5): 4767-4779. https://doi.org/10.3390/s110504767

Yuan Jianjun, Jiang Changjun, Jiang Zuowen, et al., (2010). A Biometric-Based User Authentication for Wireless Sensor Networks, WuHan University Journal of Natural Sciences, 15 (3): 272-276 https://doi.org/10.1007/s11859-010-0318-2

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present

SCImago Journal & Country Rank


CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/