A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
Wireless sensor networks (WSNs) are used for many real‐time applications. User authentication is an important security service for WSNs to ensure only legitimate users can access the sensor data within the network. In 2012, Yoo and others proposed a security‐performance‐balanced user authentication...
Saved in:
Published in | ETRI journal Vol. 35; no. 5; pp. 889 - 899 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
한국전자통신연구원
01.10.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Wireless sensor networks (WSNs) are used for many real‐time applications. User authentication is an important security service for WSNs to ensure only legitimate users can access the sensor data within the network. In 2012, Yoo and others proposed a security‐performance‐balanced user authentication scheme for WSNs, which is an enhancement of existing schemes. In this paper, we show that Yoo and others' scheme has security flaws, and it is not efficient for real WSNs. In addition, this paper proposes a new strong authentication scheme with user privacy for WSNs. The proposed scheme not only achieves end‐party mutual authentication (that is, between the user and the sensor node) but also establishes a dynamic session key. The proposed scheme preserves the security features of Yoo and others' scheme and other existing schemes and provides more practical security services. Additionally, the efficiency of the proposed scheme is more appropriate for real‐world WSNs applications. |
---|---|
Bibliography: | http://etrij.etri.re.kr/Cyber/servlet/BrowseAbstract?vol=35&pg=889 G704-001110.2013.35.5.026 |
ISSN: | 1225-6463 2233-7326 |
DOI: | 10.4218/etrij.13.0113.0103 |