Skip to main content

Anonymity Preserving Authentication and Key Agreement Scheme for Wireless Sensor Networks

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 958))

Abstract

The main purpose of our paper is to design efficient smartcard based authentication and session key agreement scheme for wireless sensor networks. Our scheme uses registration phase for both user and sensor nodes. We analyze security and simulation results using AVISPA shows that our scheme is secure against attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Turkanovic, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96–112 (2014)

    Article  Google Scholar 

  2. Watro, R., Kong, D., Cuti, S.-F., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64 (2004)

    Google Scholar 

  3. Xu, J., Zhu, W.-T., Feng, D.-G.: An improved smart card based password authentication scheme with provable security. Comput. Stand. Interface 31, 723–728 (2009)

    Article  Google Scholar 

  4. Singh, S., Chand, S., Kumar, B.: Heterogeneous HEED protocol for wireless sensor networks. Wirel. Pers. Commun. 77, 2117–2139 (2014)

    Article  Google Scholar 

  5. Wong, K., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trust worthy Computing, vol. 1, pp. 8–17 (2006)

    Google Scholar 

  6. Vaidya, B., Silva, J.S., Rodrigues, J.J.: Robust dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 88–91 (2009)

    Google Scholar 

  7. Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10, 2450–2459 (2010)

    Article  Google Scholar 

  8. Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5), 1646–1656 (2012)

    Article  Google Scholar 

  9. Turkanovic, M., Hölbl, M.: An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektronika Ir Elektrotechnika 19(6), 109–116 (2013)

    Article  Google Scholar 

  10. Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36, 58–80 (2016)

    Article  Google Scholar 

  11. Farash, M.S., Turkanovic, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. AdHoc Netw. 36, 152–176 (2016)

    Google Scholar 

  12. Manju, Chand, S., Kumar, B.: Selective α-coverage based heuristic in wireless sensor networks. Wirel. Pers. Commun. 97(1), 1623–1636 (2017)

    Article  Google Scholar 

  13. Fan, R., di Ping, L., Fu, J.-Q., Pan, X.-Z.: A secure and efficient user authentication protocol for two-tiered wireless sensor networks. In: Proceedings of the Second Pacific-Asia Conference on Circuits, Communications and System (PACCS 2010), vol. 1, pp. 425–428 (2010)

    Google Scholar 

  14. Chang, C.C., Le, H.D.: A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 15(1), 357–366 (2016)

    Article  MathSciNet  Google Scholar 

  15. Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., Wei, H.-W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)

    Article  Google Scholar 

  16. Tseng, H.-R., Jan, R.-H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the Global Telecommunications Conference (GLOBECOM 2007), vol. 1276, pp. 986–990 (2007)

    Google Scholar 

  17. Singh, S., Chand, S., Kumar, B.: Multilevel heterogeneous network model for wireless sensor networks. Telecommun. Syst. 64(2), 259–277 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepti Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, D., Singh, S., Kumar, B., Chand, S. (2019). Anonymity Preserving Authentication and Key Agreement Scheme for Wireless Sensor Networks. In: Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds) Futuristic Trends in Network and Communication Technologies. FTNCT 2018. Communications in Computer and Information Science, vol 958. Springer, Singapore. https://doi.org/10.1007/978-981-13-3804-5_36

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3804-5_36

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3803-8

  • Online ISBN: 978-981-13-3804-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics