Abstract
Security is an important aspect of any system and its development has enhanced widespread adoption of WSNs. In a typical situation, user wants to access the data directly from a node instead of accessing at the gateway or at the backend of an application system. Therefore, it is necessary that such an access is allowed only to a registered user. We present a user authentication scheme with distributed cluster formation in WSNs. This scheme works as a ring structure and uses one-way communication. In our protocol, three distinct components, gateway, user, and node, can mutually authenticate each other. In addition, we use S/Key algorithm as one-time password for authentication. Our analysis shows that our proposed scheme is as robust as conventional 4-way authentication scheme, while the communication overhead is substantially decreased.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wong K, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), pp 244–251
Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. IEEE Globecom’07, pp 986–990
Vaidya B, Rodrigues J, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int J Commun Syst 23(9–10):1201–1220
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090
Arikumar KS, Thirumoorthy K (2011) Improved user authentication in wireless sensor networks. In: Proceedings of ICETECT 2011, pp 1010–1015
Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. IEEE 6th international conference of wireless and mobile computing, networking and communications (WiMob), pp 600–606
Haller N (1994) The S/KEY one-time password system. In: Proceedings of the ISOC symposium on network and distributed system security, San Diego, CA
Agarwal S, Rungta A, Padmavathy R, Shankar M, Rajan N (2012) An improved fast and secure hash algorithm. J Inf Process Syst 8(1):119–132
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Kim, DH., Hong, YS., Lee, K.Y. (2014). User Authentication with Distributed Cluster Formation in Wireless Sensor Networks. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_10
Download citation
DOI: https://doi.org/10.1007/978-94-017-8798-7_10
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-8797-0
Online ISBN: 978-94-017-8798-7
eBook Packages: EngineeringEngineering (R0)