A Robust Password-based Authentication Scheme for Heterogeneous Sensor Networks
نویسندگان
چکیده
Abstract User authentication is a critical security function for computer systems that allow legitimate users remote access over an insecure communication network. In this paper, we propose a new password-based authentication scheme for heterogeneous sensor networks that consist of sensor nodes of different types. The proposed scheme allows legitimate users to query sensor data at any sensor node in the network, provides not only mutual authentication but also key agreement between a user and a sensor node, and adopts fuzzy identity-based encryption for gateway nodes and high-end sensor nodes. Additionally, our analysis shows that the proposed scheme is immune to some of the most notorious attacks, such as replay attacks, forgery attacks, offline-dictionary attacks, stolen smart card attacks, insider attacks, and many other potential breaches of security.
منابع مشابه
A novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملAn Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card
The cluster heads in hierarchical wireless sensor networks gather real time data from the other ordinary sensor nodes and send those data to a nearest base station. But, the main important issue is that how a user will get the real time data directly from a cluster head securely. To solve this problem, many user authentication schemes have been proposed in literature. In 2012, Das et al. propos...
متن کاملRUASN: A Robust User Authentication Framework for Wireless Sensor Networks
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an att...
متن کامل