Skip to main content
Log in

A biometric-based user authentication for wireless sensor networks

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. The protocol employs biometric keys and resists the threats of stolen verifier, of which many are logged-in users with the same login identity, guessing, replay, and impersonation. The protocol uses only Hash function and saves the computational cost, the communication cost, and the energy cost. In addition, the user’s password can be changed freely using the proposed protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Chong C Y, Kumar S. Sensor networks: Evolution, opportunities and challenges[J]. Proceedings of IEEE, 2003, 91(8): 1247–1256.

    Article  Google Scholar 

  2. Li C T. An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards[C]//The 5th International Conference on Information Assurance and Security, Xi’an: IEEE Computer Society, 2009: 517–520.

    Chapter  Google Scholar 

  3. Hwang M S, Liu C Y. Authenticated encryption schemes: Current status and key issues[J]. International Journal of Network Security, 2005, 1(2): 61–73.

    Google Scholar 

  4. Kim M, Koc C K. A simple attack on a recently introduced hash-based strong-password authentication scheme[J]. International Journal of Network Security, 2005, 1(2): 77–80.

    Google Scholar 

  5. Lee N Y, Chiu Y C. Improved remote authentication scheme with smart card[J]. Computer Standards and Interfaces, 2005, 27(2): 177–180.

    Article  Google Scholar 

  6. Daemen J, Rijndael R V. The advanced encryption standard[J]. Dr. Dobb’s Journal, 2001, 26(3): 137–139.

    Google Scholar 

  7. Khan M K, Zhang J. Improving the security of a flexible biometrics remote user authentication scheme[J]. Computer Standards and Interfaces, 2007, 29(1): 82–85.

    Article  Google Scholar 

  8. Khan M K, Zhang J, Wang X. Chaotic Hash-based fingerprint biometric remote user authentication scheme on mobile devices[J]. Chaos, Solitons and Fractals, 2008, 35(3): 519–524.

    Article  Google Scholar 

  9. Li C T, Hwang M S. An efficient biometrics-based remote user authentication scheme using smart cards[J]. Journal of Network and Computer Applications, 2010, 33(1): 1–5.

    Article  MATH  Google Scholar 

  10. Perrig A, Szewczyk R, Wen V, et al. SPINS: Security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521–534.

    Article  MATH  Google Scholar 

  11. Sastry N, Wagner D. Security considerations for IEEE 802.15.4 Networks[C]//ACM Workshop Wireless Security. Philadelphia: ACM Press, 2004: 32–42.

    Google Scholar 

  12. Karlof C, Sastry N, Wagner D. TinySec: A link layer security architecture for wireless sensor networks[C]//International Conference Embedded Networked Sensor Systems. Baltimore: ACM Press, 2004: 162–175.

    Chapter  Google Scholar 

  13. Watro R, Kong D, Cuti S, et al. TinyPK: Securing sensor networks with public key technology[C]//ACM Workshop Security of Ad Hoc Sensor Networks. Washington D C: ACM Press, 2004: 59–64.

    Chapter  Google Scholar 

  14. Wong K, Zheng Y, Cao J, et al. A dynamic user authentication scheme for wireless sensor networks[C]//IEEE International Conference Sensor Networks, Ubiquitous, Trustworthy Computing, Taibei: IEEE Computer Society, 2006: 244–251.

    Chapter  Google Scholar 

  15. Lee J K, Ryu S R, Yoo K Y. Fingerprint-based remote user authentication scheme using smart cards[J]. Electronic Letters, 2002, 38(12): 554–555.

    Article  Google Scholar 

  16. Lin C H, Lai Y Y. A Flexible biometrics remote user authentication scheme[J]. Computer Standards and Interfaces, 2004, 27(1): 19–23.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changjun Jiang.

Additional information

Foundation item: Supported by the National High Technology Research and Development Program of China (863 Program) (2009AA01Z401, 2009 AA01Z141) and the National Natural Science Foundation of China (90718012, 90818023)

Biography: YUAN Jianjun, male, Ph. D. candidate, research direction: information security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yuan, J., Jiang, C. & Jiang, Z. A biometric-based user authentication for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 15, 272–276 (2010). https://doi.org/10.1007/s11859-010-0318-2

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-010-0318-2

Key words

CLC number

Navigation