Abstract
This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. The protocol employs biometric keys and resists the threats of stolen verifier, of which many are logged-in users with the same login identity, guessing, replay, and impersonation. The protocol uses only Hash function and saves the computational cost, the communication cost, and the energy cost. In addition, the user’s password can be changed freely using the proposed protocol.
Similar content being viewed by others
References
Chong C Y, Kumar S. Sensor networks: Evolution, opportunities and challenges[J]. Proceedings of IEEE, 2003, 91(8): 1247–1256.
Li C T. An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards[C]//The 5th International Conference on Information Assurance and Security, Xi’an: IEEE Computer Society, 2009: 517–520.
Hwang M S, Liu C Y. Authenticated encryption schemes: Current status and key issues[J]. International Journal of Network Security, 2005, 1(2): 61–73.
Kim M, Koc C K. A simple attack on a recently introduced hash-based strong-password authentication scheme[J]. International Journal of Network Security, 2005, 1(2): 77–80.
Lee N Y, Chiu Y C. Improved remote authentication scheme with smart card[J]. Computer Standards and Interfaces, 2005, 27(2): 177–180.
Daemen J, Rijndael R V. The advanced encryption standard[J]. Dr. Dobb’s Journal, 2001, 26(3): 137–139.
Khan M K, Zhang J. Improving the security of a flexible biometrics remote user authentication scheme[J]. Computer Standards and Interfaces, 2007, 29(1): 82–85.
Khan M K, Zhang J, Wang X. Chaotic Hash-based fingerprint biometric remote user authentication scheme on mobile devices[J]. Chaos, Solitons and Fractals, 2008, 35(3): 519–524.
Li C T, Hwang M S. An efficient biometrics-based remote user authentication scheme using smart cards[J]. Journal of Network and Computer Applications, 2010, 33(1): 1–5.
Perrig A, Szewczyk R, Wen V, et al. SPINS: Security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521–534.
Sastry N, Wagner D. Security considerations for IEEE 802.15.4 Networks[C]//ACM Workshop Wireless Security. Philadelphia: ACM Press, 2004: 32–42.
Karlof C, Sastry N, Wagner D. TinySec: A link layer security architecture for wireless sensor networks[C]//International Conference Embedded Networked Sensor Systems. Baltimore: ACM Press, 2004: 162–175.
Watro R, Kong D, Cuti S, et al. TinyPK: Securing sensor networks with public key technology[C]//ACM Workshop Security of Ad Hoc Sensor Networks. Washington D C: ACM Press, 2004: 59–64.
Wong K, Zheng Y, Cao J, et al. A dynamic user authentication scheme for wireless sensor networks[C]//IEEE International Conference Sensor Networks, Ubiquitous, Trustworthy Computing, Taibei: IEEE Computer Society, 2006: 244–251.
Lee J K, Ryu S R, Yoo K Y. Fingerprint-based remote user authentication scheme using smart cards[J]. Electronic Letters, 2002, 38(12): 554–555.
Lin C H, Lai Y Y. A Flexible biometrics remote user authentication scheme[J]. Computer Standards and Interfaces, 2004, 27(1): 19–23.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National High Technology Research and Development Program of China (863 Program) (2009AA01Z401, 2009 AA01Z141) and the National Natural Science Foundation of China (90718012, 90818023)
Biography: YUAN Jianjun, male, Ph. D. candidate, research direction: information security.
Rights and permissions
About this article
Cite this article
Yuan, J., Jiang, C. & Jiang, Z. A biometric-based user authentication for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 15, 272–276 (2010). https://doi.org/10.1007/s11859-010-0318-2
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-010-0318-2