Skip to main content

User Authentication with Distributed Cluster Formation in Wireless Sensor Networks

  • Conference paper
  • First Online:
Book cover Frontier and Innovation in Future Computing and Communications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 301))

Abstract

Security is an important aspect of any system and its development has enhanced widespread adoption of WSNs. In a typical situation, user wants to access the data directly from a node instead of accessing at the gateway or at the backend of an application system. Therefore, it is necessary that such an access is allowed only to a registered user. We present a user authentication scheme with distributed cluster formation in WSNs. This scheme works as a ring structure and uses one-way communication. In our protocol, three distinct components, gateway, user, and node, can mutually authenticate each other. In addition, we use S/Key algorithm as one-time password for authentication. Our analysis shows that our proposed scheme is as robust as conventional 4-way authentication scheme, while the communication overhead is substantially decreased.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wong K, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), pp 244–251

    Google Scholar 

  2. Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. IEEE Globecom’07, pp 986–990

    Google Scholar 

  3. Vaidya B, Rodrigues J, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int J Commun Syst 23(9–10):1201–1220

    Article  Google Scholar 

  4. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090

    Article  Google Scholar 

  5. Arikumar KS, Thirumoorthy K (2011) Improved user authentication in wireless sensor networks. In: Proceedings of ICETECT 2011, pp 1010–1015

    Google Scholar 

  6. Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. IEEE 6th international conference of wireless and mobile computing, networking and communications (WiMob), pp 600–606

    Google Scholar 

  7. Haller N (1994) The S/KEY one-time password system. In: Proceedings of the ISOC symposium on network and distributed system security, San Diego, CA

    Google Scholar 

  8. Agarwal S, Rungta A, Padmavathy R, Shankar M, Rajan N (2012) An improved fast and secure hash algorithm. J Inf Process Syst 8(1):119–132

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ki Young Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Kim, DH., Hong, YS., Lee, K.Y. (2014). User Authentication with Distributed Cluster Formation in Wireless Sensor Networks. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8798-7_10

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8797-0

  • Online ISBN: 978-94-017-8798-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics