User Authentication with Session Key Interchange for Wireless Sensor Network

Author(s):  
Prasanta Kumar Roy ◽  
Krittibas Parai ◽  
Abul Hasnat
2020 ◽  
Vol 8 (4) ◽  
pp. 253-265
Author(s):  
Prabu P ◽  
Senthilnathan T

PurposeIn wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.Design/methodology/approachIn previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.FindingsHere, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.Originality/valueThe foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Gulzar Mehmood ◽  
Muhammad Sohail Khan ◽  
Abdul Waheed ◽  
Mahdi Zareei ◽  
Muhammad Fayaz ◽  
...  

Wireless Sensor Network (WSN) is a particular network built from small sensor nodes. These sensor nodes have unique features. That is, it can sense and process data in WSN. WSN has tremendous applications in many fields. Despite the significance of WSN, this kind of network faced several issues. The biggest problems rising in WSN are energy consumption and security. Robust security development is needed to cope with WSN applications. For security purposes in WSN, cryptography techniques are very favorable. However, WSN has resource limitations, which is the main problem in applying any security scheme. Hence, if we are using the cryptography scheme in WSN, we must first guarantee that it must be energy-efficient. Thus, we proposed a secure hybrid session key management scheme for WSN. In this scheme, the major steps of public key cryptography are minimized, and much of the operations are based on symmetric key cryptography. This strategy extensively reduces the energy consumption of WSN and ensures optimum security. The proposed scheme is implemented, and their analysis is performed using different parameters with benchmark schemes. We concluded that the proposed scheme is energy-efficient and outperforms the available benchmark schemes. Furthermore, it provides an effective platform for secure key agreements and management in the WSN environment.


2021 ◽  
Author(s):  
M. Zulfiker Ali

The primary requirements of a secure Wireless Sensor Network architecture are confidentiality, integrity and authentication of users and other participating entities. User Authentication for wireless sensor networks is a fundamental and important issue in designing dependable and secure systems. In this thesis, we have outlined the security model, functional requirements, assumptions and network setup for an authentication scheme in the first phase. Keeping in mind the security requirements as well as the flaws of past authentication schemes, we propose a robust user authentication method that inherits user anonymity, mutual authentication and password changing functionality of previous password-based schemes and improves security by resisting gateway bypass and replay attack, and many logged in user with the same ID threat. Our scheme is a variant of strong password based schemes that does not require strict network synchronization. In the second phase of the thesis, we have analysed our authentication scheme from the perspective of security issues and functional requirements. The proposed scheme is modelled in SystemC. It is evaluated in different attack scenarios. The authentication latency, memory and functional requirements, and computational overhead are the metrics used to evaluate the scheme. The effect of multiple users on authentication latency in our scheme is also studied. Some of the past representative schemes have also been modelled and evaluated in the same environment. A detailed comparison of over-head cost, authentication latency and security features are provided in this thesis. It is verified and confirmed by modeling that our scheme provides enhanced security without adding extra computation at the sensor node.


Author(s):  
Shakera Shaikh ◽  
Veena Gulhane

A wireless sensor network(WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor node is communicated to the base station, which forwards the data to the end user. In wireless sensor network data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. This paper synthesizes existing user authentication schemes in wireless sensor networks and highlights the challenges in user authentication.


Sign in / Sign up

Export Citation Format

Share Document