Abstract
Wireless sensor networks (WSNs) have a broad range of applications in most of the sectors which require a high level of security. These networks provide sensor data to the external users on a real-time basis; thus, it is a good idea to provide them immediate access. User authentication is an essential requirement to access the services of sensor areas to prevent unauthorized access. The network and data security are key concerns in WSNs for secure and authentic data communication. Thus, an analysis of a secure and efficient data transmission scheme is considered. In this paper, an analysis of existing user authentication schemes is discussed and provides comparative studies of user authentication schemes for network security. An explicitly simulated one of the user authentication schemes by the AVISPA tool is discussed, and its demonstration is also given which shows the resistant to the cryptographic attacks. The lower communication costs are one of the main parameters, i.e., considered to compared with the previous relevant techniques. Moreover, future directions are also discussed for the existing works.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ullo SL, Sinha GR (2020) Advances in smart environment monitoring systems using IoT and sensors. Sensors 20(11):3113
Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101
Dammak M et al (2019) Token-based lightweight authentication to secure IoT networks. In: 2019 16th IEEE annual Consumer Communications Networking Conference (CCNC), IEEE
Singh D et al (2019) SMAC-AS: MAC based secure authentication scheme for wireless sensor network. Wireless Personal Commun 107(2):1289–1308
Gupta S, Singhal A, Kapoor A (2016) A literature survey on social engineering attacks: Phishing attack. In: 2016 international conference on computing, communication and automation (ICCCA), IEEE
Ahemd MM, Shah MA, Wahid A (2017) IoT security: a layered approach for attacks defenses. In: 2017 international conference on Communication Technologies (ComTech), IEEE
Ometov A et al (2018) Multi-factor authentication: a survey. Cryptography 2(1):1
Holohan E, Schukat M (2010) Authentication using virtual certificate authorities: a new security paradigm for wireless sensor networks. In: 2010 ninth IEEE international symposium on network computing and applications, IEEE
Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1):e2933
Dahia G, Jesus L, Segundo MP (2020) Continuous authentication using biometrics: an advanced review. Wiley Interdisc Rev: Data Mining Knowl Discovery 10(4):e1365
Park YY, Choi Y, Lee K (2014) A study on the design and implementation of facial recognition application system. Int J Bio-Sci Bio-Technol 6(2):1–10
Yang C-C, Wang R-C, Liu W-T (2005) Secure authentication scheme for session initiation protocol. Comput Security 24(5):381–386
Knox DA, Kunz T (2015) Wireless fingerprints inside a wireless sensor network. ACM Trans Sensor Netw (TOSN) 11(2):1–30
Sahidullah M, Kinnunen T (2016) Local spectral variability features for speaker verification. Digital Signal Process 50:1–11
Imran M, Said AM, Hasbullah H (2010) A survey of simulators, emulators and testbeds for wireless sensor networks. In: 2010 international symposium on information technology, vol 2, IEEE
El-said SA, Hassanien AE (2013) Artificial eye vision using wireless sensor networks. In: Wireless Sensor Networks: Theory and Applications. CRC Press, Taylor and Francis Group, Boca Raton
Tanuja R et al (2015) Token based privacy preserving access control in wireless sensor networks. In: 2015 International Conference on Advanced Computing and Communications (ADCOM), IEEE
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wireless Commun 8(3):1086–1090
Chang C-C, Le H-D (2015) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wireless Commun 15(1):357–366
Banerjee S et al (2019) An enhanced and secure biometric based user authentication scheme in wireless sensor networks using smart cards. Wireless Personal Commun 107(1):243–270
Xie Q et al (2021) A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP J Wireless Commun Netw 1:1–17
Singh D, Kumar B, Singh S, Chand S (2020) Evaluating authentication schemes for real-time data in wireless sensor network. Wireless Personal Commun 114(1):629–655
Singh D, Kumar B, Singh S, Chand S, Singh PK (2021) RCBE-AS: rabin cryptosystem–based efficient authentication scheme for wireless sensor networks. In: Personal and ubiquitous computing, pp 1–22
Singh D, Kumar B, Singh S, Chand S (2020) A secure IoT-based mutual authentication for healthcare applications in wireless sensor networks using ECC. Int J Healthcare Inf Syst Informatics (IJHISI) 16(2):21–48
Shuai M et al (2021) A lightweight three-factor anonymous authentication scheme with privacy protection for personalized healthcare applications. J Organizational End User Comput (JOEUC) 33(3):1–18
Xie Q, Ding Z, Hu B (2021) A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things. In: Security and communication networks 2021
Singh D et al (2021) RCBE-AS: rabin cryptosystem–based efficient authentication scheme for wireless sensor networks. In: Personal and ubiquitous computing, pp 1–22
The AVISPA project. http://www.avispaproject.org
Xun Y et al (2019) Automobile driver fingerprinting: a new machine learning based authentication scheme. IEEE Trans Industrial Informatics 16(2):1417–1426
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, R., Singh, S. (2023). Performance Analysis of User Authentication Schemes in Wireless Sensor Networks. In: Singh, Y., Singh, P.K., Kolekar, M.H., Kar, A.K., Gonçalves, P.J.S. (eds) Proceedings of International Conference on Recent Innovations in Computing. Lecture Notes in Electrical Engineering, vol 1001. Springer, Singapore. https://doi.org/10.1007/978-981-19-9876-8_43
Download citation
DOI: https://doi.org/10.1007/978-981-19-9876-8_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9875-1
Online ISBN: 978-981-19-9876-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)