Abstract
In security-sensitive wireless networks of sensor devices, the authenticity of the legitimate user is the prominent requirement. Because of constraints-resources of these sensor devices implementing traditional cryptographic mechanism is not an easy task. In this paper, we propose a lightweight mechanism for authenticating users of a sensor network using fuzzy extractor along with a novel matrix based session key establishment scheme. After that, we perform the security analysis of our protocol using widely accepted automated verification tools such as AVISPA and Scyther. Then, we perform logical verification using BAN Logic. Finally, we do the computational analysis, and we demonstrate the comparative analysis in respect of computational overhead and security features.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, pp. 59–64. ACM Press (2004)
Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, pp. 1–9 (2006)
Tseng, H.R., Jan, R.H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM 2007), Washington, DC, USA, pp. 986–990 (2007)
Lee, T.H.: Simple Dynamic user authentication protocols for wireless sensor networks. In: The Second International Conference on Sensor Technologies and Applications, pp. 657–660 (2008)
Ko, L.C.: A novel dynamic user authentication scheme for wireless sensor networks. In: IEEE International Symposium on Wireless Communication Systems (ISWCS 2008), pp. 608–612 (2008)
Vaidya, B., Silva, J.S., Rodrigues, J.J.: Robust dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), Tenerife, Spain, pp. 88–91 (2009)
Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless. Comm. 8, 1086–1090 (2009)
Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks”. Sensors 10(3), 2450–2459 (2010)
Yuan, J., Jiang, C., Jiang, Z.: A biometric-based user authentication for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 15(3), 272–276 (2010)
Yoo, S.G., Park, K.Y., Kim, J.: A Security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, 1–11 (2012)
Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36(1), 316–323 (2013)
Jiang, Q., Ma, J., Lu, X., Tian, Y.: An effcient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8, 1070–1081 (2014). https://doi.org/10.1007/s12083-014-0285-z
Das, A.K.: A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. (2015). https://doi.org/10.1002/dac.2933
Althobaiti, O., Al-Rodhaan, M., Al-Dhelaan, A.: An efficient biometric authentication protocol for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 1–13 (2013). Article ID 407971
Sun, D.Z., Li, J.X., Feng, Z.Y., Cao, Z.F., Xu, G.Q.: On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquit. Comput. 17(5), 895–905 (2013)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_31
Choi, S.J., Youn, H.Y.: An efficient key pre-distribution scheme for secure distributed sensor networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) EUC 2005. LNCS, vol. 3823, pp. 1088–1097. Springer, Heidelberg (2005). https://doi.org/10.1007/11596042_111
Pathan, A.K., Dai, T.T., Hong, C.S.: An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks. In: Proceedings of The Sixth IEEE International Conference on Computer and Information Technology, CIT 2006, p. 227 (2006)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198–208 (1983)
AVISPA. http://www.avispa-project.org/
Cremers, C.: Scyther - semantics and verification of security protocols. Ph.D. dissertation, Eindhoven University of Technology, Netherlands (2006)
Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. Roy. Soc. Lond. 426, 233–271 (1989)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Maurya, A.K., Sastry, V.N. (2017). User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_4
Download citation
DOI: https://doi.org/10.1007/978-981-10-6898-0_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6897-3
Online ISBN: 978-981-10-6898-0
eBook Packages: Computer ScienceComputer Science (R0)