Abstract
Wireless sensor networks (WSNs) are becoming very popular. The security of such networks is thus crucial. The asymmetric key cryptography results in increased computational overheads. WSN systems are not designed to handle such costs. Most WSN systems are based on symmetric-key cryptography mechanisms to avoid such overheads. However, they give rise to many security attacks such as sybil attacks. In this paper, we introduce a new protocol based on mutual authentication between a Sensor and User with asymmetric cryptography and low overhead handling cost. The information sharing between the Sensor Node and the User uses elliptic-curve Diffie–Hellman protocol. Further, the protocol protects from masquerade attacks, replay attacks, sinkhole attacks, sybil attacks, etc. The protocol is implemented and verified using AVISPA software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
S. Kumari, H. Om, Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput. Netw. 104, 137–154 (2016)
B. Vaidya, D. Makrakis, H.T. Mouftah, Improved two-factor user authentication in wireless sensor networks, in IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (IEEE, 2010), pp. 600–606
L. Lamport, Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
L. Eschenauer, V. Gligor, A key management scheme for distributed sensor networks, in CCS ’02: Proceedings of the 9th ACM Conference on Computer and Communications Security (New York, USA, 2002)
H. Chan, A. Perrig, D. Song, Random key pre-distribution schemes for sensor networks, in Proceedings of the IEEE Security and Privacy Symposium (2003)
R. Watro, D. Kong, S.F. Cuti, C. Gardiner, C. Lynn, P. Kruus, TinyPK: securing sensor networks with public key technology, in SASN ’04 (New York, USA, 2004), pp. 59–64
M.L. Das, Two-factor User authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8, 1086–1090 (2009)
M.K. Khan, K. Alghathbar, Cryptanalysis and security improvements of two–factor User authentication in wireless sensor networks. Sensors 10(3), 2450–2459 (2010)
K. Xue, C. Ma, P. Hong, R. Ding, A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36, 316–323 (2013)
M. Turkanovic, B. Brumen, M. Hölbl, A novel User authentication and key agreement scheme for heterogeneous adhoc wireless sensor networks, based on the internet of things notion. AdHoc Netw. 20, 96–112 (2014). https://doi.org/10.1016/j.adhoc.2014.03.009
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Verma, N., Kaushik, A., Nayak, P. (2021). A Lightweight Secure Authentication Protocol for Wireless Sensor Networks. In: Gupta, D., Khanna, A., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1165. Springer, Singapore. https://doi.org/10.1007/978-981-15-5113-0_21
Download citation
DOI: https://doi.org/10.1007/978-981-15-5113-0_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5112-3
Online ISBN: 978-981-15-5113-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)