| Literature DB >> 22163874 |
Hsiu-Lien Yeh1, Tien-Ho Chen, Pin-Chuan Liu, Tai-Hoo Kim, Hsin-Wen Wei.
Abstract
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.Entities:
Keywords: ECC; authentication; security; wireless sensor network
Mesh:
Year: 2011 PMID: 22163874 PMCID: PMC3231356 DOI: 10.3390/s110504767
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Notations.
| U | A user |
| ID | A user’s identity |
| PW | A user’s password |
| DID | A user’s dynamic login identity |
| GW-node | Gateway node of WSN |
| Sn | Nearest sensor node of WSN |
| h(.) | A secure one-way hash function |
| xa | A permanent secret parameter generated securely by the GW-node and stored in some defined sensor nodes before deploying the WSN |
| K | A symmetric key of GW-node which shared between the GW-node, users and the sensor nodes |
| || | A string concatenation operation |
| ⊕ | A string XOR operation |
| ⇒ | A secure channel |
| → | A public channel |
Figure 1.Communication handshakes of the proposed scheme.
Security comparison among the referenced protocols.
| Avoiding insider attack | Yes | No | No | Yes | Yes |
| Securely change/update password | Yes | No | No | No | No |
| Avoiding forgery attack | Yes | Yes | No | Yes | No |
| Mutual authentication | Yes | Yes | No | Yes | No |
| Avoiding masquerade attack | Yes | Yes | Yes | No | Yes |
| Avoiding replay attack | Yes | Yes | Yes | Yes | No |
| Avoiding guessing attack | Yes | Yes | Yes | Yes | Yes |
Performance comparison among related protocols.
| Authentication (Verification and Mutual Authentication) | 11 th + 4 tPA + 6 tPM + 2 tE | 7 th | 5th | 2th+2tPR+2tPU | 4th |