Skip to main content

User Authentication with Session Key Interchange for Wireless Sensor Network

  • Chapter
  • First Online:
Methodologies and Application Issues of Contemporary Computing Framework

Abstract

Secure user authentication is an indispensable issue in wireless sensor network (WSN) as the sensor nodes are deployed in public environment. In 2014, Nam et al. proposed their scheme in this regard. This manuscript highlights several limitations of Nam et al. protocol such as denial of service, no login phase verification, clock synchronization problem, improper mutual authentication, key-compromised impersonation and man-in-the-middle attack, and unverified password update phase. Hence, we put forward an efficient two-factor user authentication with session key interchange protocol for WSN (ASKI-WSN) based on elliptic curve cryptography (ECC) to overcome these limitations. The proposed ASKI-WSN scheme is informally verified under several security threats and formally validated using widely accepted automated validation of Internet security protocols and applications (AVISPA) tool. Finally, the performance analysis of our ASKI-WSN scheme in terms of security and computation cost shows its efficiency for practical applications as compared to some existing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Survey on sensor network. IEEE Commun. Mag. 40, 102–114 (2002)

    Article  Google Scholar 

  2. K.H.M. Wong, Y. Zheng, J. Cao, S. Wang, A dynamic user authentication scheme for wireless sensor networks, in Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (Taichung, Taiwan, 2006), pp. 244–251

    Google Scholar 

  3. M.L. Das, Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086–1090 (2009)

    Article  Google Scholar 

  4. T.H. Chen, W.K. Shih, A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010)

    Article  Google Scholar 

  5. H.L. Yeh, T.H. Chen, P.C. Liu, T.H. Kim, H.W. Wei, A secured authentication protocol for wireless sensor network using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)

    Article  Google Scholar 

  6. W. Shi, P. Gong, A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw., Article ID 730831 (2013)

    Google Scholar 

  7. Y. Choi, D. Lee, J. Kin, J. Jung, J. Nam, D. Won, Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6), 10081–10106 (2014)

    Article  Google Scholar 

  8. J. Nam, M. Kim, J. Paik, Y. Lee, D. Won, A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14(11), 21023–21044 (2014)

    Article  Google Scholar 

  9. D. Dolev, A.C. Yao, On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  10. Q. Xie, D. Hong, M. Bao, N. Dong, D.S Wong, Privacy-preserving mobile roaming authentication with security proof in global mobility networks. Int. J. Distrib. Sens. Netw. 10(5), Article ID 325734 (2014)

    Article  Google Scholar 

  11. C. Boyd, A. Mathuria, Protocols for Authentication and Key Establishment. Springer Science and Business Media (2013)

    Google Scholar 

  12. Y. Lu, L. Li, Y. Yang, Robust and efficient authentication scheme for session initiation protocol. Math. Prob. Eng., Article ID 894549 (2015)

    Google Scholar 

  13. P. Rogaway, T. Shrimpton, Cryptographic hash function basic: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. in Proceedings of International Workshop on Fast Software Encryption (2004), pp. 371–388

    Google Scholar 

  14. N. Koblitz, Elliptic curve cryptosystem. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  Google Scholar 

  15. T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)

    Article  MathSciNet  Google Scholar 

  16. A. Armando, The AVISPA tool for the automated validation of internet security protocol and applications. in Computer Aided Verification (Springer, Berlin, Germany, 2005), pp. 281–285

    Chapter  Google Scholar 

  17. D.V. Oheimb, The high-level protocol specification language HLPSL developed in the EU project AVISPA, in Proceedings of APPSEM Workshop (2005), pp. 1–17

    Google Scholar 

  18. D. Basin, S. Modersheim, L. Vigano, OFMC: a symbolic model checker for security protocol. Int. J. Inf. Secur. 4(3), 181–208 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Krittibas Parai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Roy, P.K., Parai, K., Hasnat, A. (2018). User Authentication with Session Key Interchange for Wireless Sensor Network. In: Mandal, J., Mukhopadhyay, S., Dutta, P., Dasgupta, K. (eds) Methodologies and Application Issues of Contemporary Computing Framework. Springer, Singapore. https://doi.org/10.1007/978-981-13-2345-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2345-4_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2344-7

  • Online ISBN: 978-981-13-2345-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics