A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks

Wireless sensor networks (WSNs) are used for many real‐time applications. User authentication is an important security service for WSNs to ensure only legitimate users can access the sensor data within the network. In 2012, Yoo and others proposed a security‐performance‐balanced user authentication...

Full description

Saved in:
Bibliographic Details
Published inETRI journal Vol. 35; no. 5; pp. 889 - 899
Main Authors Kumar, Pardeep, Gurtov, Andrei, Ylianttila, Mika, Lee, Sang‐Gon, Lee, HoonJae
Format Journal Article
LanguageEnglish
Published 한국전자통신연구원 01.10.2013
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Wireless sensor networks (WSNs) are used for many real‐time applications. User authentication is an important security service for WSNs to ensure only legitimate users can access the sensor data within the network. In 2012, Yoo and others proposed a security‐performance‐balanced user authentication scheme for WSNs, which is an enhancement of existing schemes. In this paper, we show that Yoo and others' scheme has security flaws, and it is not efficient for real WSNs. In addition, this paper proposes a new strong authentication scheme with user privacy for WSNs. The proposed scheme not only achieves end‐party mutual authentication (that is, between the user and the sensor node) but also establishes a dynamic session key. The proposed scheme preserves the security features of Yoo and others' scheme and other existing schemes and provides more practical security services. Additionally, the efficiency of the proposed scheme is more appropriate for real‐world WSNs applications.
Bibliography:http://etrij.etri.re.kr/Cyber/servlet/BrowseAbstract?vol=35&pg=889
G704-001110.2013.35.5.026
ISSN:1225-6463
2233-7326
DOI:10.4218/etrij.13.0113.0103