Skip to main content

User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 746))

Included in the following conference series:

  • 1007 Accesses

Abstract

In security-sensitive wireless networks of sensor devices, the authenticity of the legitimate user is the prominent requirement. Because of constraints-resources of these sensor devices implementing traditional cryptographic mechanism is not an easy task. In this paper, we propose a lightweight mechanism for authenticating users of a sensor network using fuzzy extractor along with a novel matrix based session key establishment scheme. After that, we perform the security analysis of our protocol using widely accepted automated verification tools such as AVISPA and Scyther. Then, we perform logical verification using BAN Logic. Finally, we do the computational analysis, and we demonstrate the comparative analysis in respect of computational overhead and security features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, pp. 59–64. ACM Press (2004)

    Google Scholar 

  3. Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, pp. 1–9 (2006)

    Google Scholar 

  4. Tseng, H.R., Jan, R.H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM 2007), Washington, DC, USA, pp. 986–990 (2007)

    Google Scholar 

  5. Lee, T.H.: Simple Dynamic user authentication protocols for wireless sensor networks. In: The Second International Conference on Sensor Technologies and Applications, pp. 657–660 (2008)

    Google Scholar 

  6. Ko, L.C.: A novel dynamic user authentication scheme for wireless sensor networks. In: IEEE International Symposium on Wireless Communication Systems (ISWCS 2008), pp. 608–612 (2008)

    Google Scholar 

  7. Vaidya, B., Silva, J.S., Rodrigues, J.J.: Robust dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), Tenerife, Spain, pp. 88–91 (2009)

    Google Scholar 

  8. Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless. Comm. 8, 1086–1090 (2009)

    Article  Google Scholar 

  9. Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks”. Sensors 10(3), 2450–2459 (2010)

    Article  Google Scholar 

  10. Yuan, J., Jiang, C., Jiang, Z.: A biometric-based user authentication for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 15(3), 272–276 (2010)

    Article  MathSciNet  Google Scholar 

  11. Yoo, S.G., Park, K.Y., Kim, J.: A Security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, 1–11 (2012)

    Google Scholar 

  12. Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36(1), 316–323 (2013)

    Article  Google Scholar 

  13. Jiang, Q., Ma, J., Lu, X., Tian, Y.: An effcient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8, 1070–1081 (2014). https://doi.org/10.1007/s12083-014-0285-z

    Article  Google Scholar 

  14. Das, A.K.: A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. (2015). https://doi.org/10.1002/dac.2933

  15. Althobaiti, O., Al-Rodhaan, M., Al-Dhelaan, A.: An efficient biometric authentication protocol for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 1–13 (2013). Article ID 407971

    Google Scholar 

  16. Sun, D.Z., Li, J.X., Feng, Z.Y., Cao, Z.F., Xu, G.Q.: On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquit. Comput. 17(5), 895–905 (2013)

    Article  Google Scholar 

  17. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_31

    Chapter  Google Scholar 

  18. Choi, S.J., Youn, H.Y.: An efficient key pre-distribution scheme for secure distributed sensor networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) EUC 2005. LNCS, vol. 3823, pp. 1088–1097. Springer, Heidelberg (2005). https://doi.org/10.1007/11596042_111

    Chapter  Google Scholar 

  19. Pathan, A.K., Dai, T.T., Hong, C.S.: An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks. In: Proceedings of The Sixth IEEE International Conference on Computer and Information Technology, CIT 2006, p. 227 (2006)

    Google Scholar 

  20. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198–208 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  21. AVISPA. http://www.avispa-project.org/

  22. Cremers, C.: Scyther - semantics and verification of security protocols. Ph.D. dissertation, Eindhoven University of Technology, Netherlands (2006)

    Google Scholar 

  23. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. Roy. Soc. Lond. 426, 233–271 (1989)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anup Kumar Maurya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maurya, A.K., Sastry, V.N. (2017). User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6898-0_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6897-3

  • Online ISBN: 978-981-10-6898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics