Advertisement

Soft Computing

, Volume 23, Issue 14, pp 5683–5691 | Cite as

An novel anonymous user WSN authentication for Internet of Things

  • Xin Zhang
  • Fengtong WenEmail author
Methodologies and Application
  • 128 Downloads

Abstract

The proliferation of current wireless networks and devices has been promoting the development of Internet of Things (IoT). Since the devices have low data handling capabilities and limited storage space in IoT environment, authentication between users and servers is essential. In this paper, we briefly introduce two models tailored for the Internet of Things environment and design an authentication protocol for each model, respectively, which has a higher security level and the lower computational consumption compared with some existing authentications for IoT or WSN.

Keywords

Internet of Things Authentication Anonymity Security WSN 

Notes

Acknowledgements

This study was funded by the National Science Foundation of Shandong Province (No. ZR2018LF006).

Conflict of Interest

The authors declare that they have no conflict of interest.

References

  1. Chen TH (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712Google Scholar
  2. Chen Y, Martnez JF, Castillejo P et al (2017) A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth. Wirel Commun Mob Comput 2017(16):1–17Google Scholar
  3. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090Google Scholar
  4. Das AK, Sharma P, Chatterjee S et al (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656Google Scholar
  5. Fantacci R, Pecorella T, Viti R et al (2014) A network architecture solution for efficient IOT WSN backhauling: challenges and opportunities. Wirel Commun IEEE 21(4):113–119Google Scholar
  6. Farash MS, Turkanović M, Kumari S, Hölbl M (2015) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw 36(P1):152–176Google Scholar
  7. He D, Gao Y, Chan S et al (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371Google Scholar
  8. Jangirala S, Mishra D, Mukhopadhyay S (2016) Secure lightweight user authentication and key agreement scheme for wireless sensor networks tailored for the Internet of Things environment. In: Ray I, Gaur M, Conti M, Sanghi D, Kamakoti V (eds) Information Systems Security. Springer, Cham, pp 45–65Google Scholar
  9. Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459Google Scholar
  10. Li X, Niu J, Liao J et al (2015) Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 28(2):374–382Google Scholar
  11. Li X, Niu J, Bhuiyan MZA et al (2017) A robust ECC based provable secure authentication protocol with privacy protection for industrial Internet of Things. IEEE Trans Ind Inform PP(99):1Google Scholar
  12. Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw 32(2):17–31Google Scholar
  13. Ramesh MV (2014) Design, development, and deployment of a wireless sensor network for detection of landslides. Ad Hoc Netw 13(1):2–18Google Scholar
  14. Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE global telecommunications conference. IEEE, pp 986–990Google Scholar
  15. Turkanovic M, Hölbl M (2013) An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektron Elektrotech 19(6):109–116Google Scholar
  16. Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw 20(2):96–112Google Scholar
  17. Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: 2010 IEEE 6th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 600–606Google Scholar
  18. Wen F, Li X (2013) An improved dynamic ID-based remote user authentication with key agreement scheme. Comput Electr Eng 38(2):381–387Google Scholar
  19. Wen F, Willy S, Yang G (2014) A robust smart card-based anonymous user authentication protocol for wireless communications. Secur Commun Netw 7(6):987–993Google Scholar
  20. Wong KHM, Zheng Y, Cao J et al (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing. IEEE, pp 244–251Google Scholar
  21. Wu F, Xu L, Kumari S et al (2016) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J Ambient Intell Humaniz Comput 8(1):1–16Google Scholar
  22. Xue K, Ma C, Hong P et al (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323Google Scholar
  23. Yeh HL, Chen TH, Liu PC et al (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–79Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Mathematical SciencesUniversity of JinanJinanChina

Personalised recommendations