Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2011, Vol. 12 Issue (7): 550-560    DOI: 10.1631/jzus.C1000377
    
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong FAN, Dao-jing HE*, Xue-zeng PAN, Ling-di PING
School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
Download:   PDF(307KB)
Export: BibTeX | EndNote (RIS)      

Abstract  Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints. Considering that most large-scale WSNs follow a two-tiered architecture, we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs. The proposed approach reduces the computational load, since it performs only simple operations, such as exclusive-OR and a one-way hash function. This feature is more suitable for the resource-limited sensor nodes and mobile devices. And it is unnecessary for master nodes to forward login request messages to the base station, or maintain a long user list. In addition, pseudonym identity is introduced to preserve user anonymity. Through clever design, our proposed scheme can prevent smart card breaches. Finally, security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.

Key wordsUser authentication      User anonymity      Smart card      Two-tiered      Wireless sensor network (WSN)     
Received: 27 October 2010      Published: 04 July 2011
CLC:  TP393  
Cite this article:

Rong FAN, Dao-jing HE, Xue-zeng PAN, Ling-di PING. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Front. Inform. Technol. Electron. Eng., 2011, 12(7): 550-560.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/jzus.C1000377     OR     http://www.zjujournals.com/xueshu/fitee/Y2011/V12/I7/550


An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints. Considering that most large-scale WSNs follow a two-tiered architecture, we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs. The proposed approach reduces the computational load, since it performs only simple operations, such as exclusive-OR and a one-way hash function. This feature is more suitable for the resource-limited sensor nodes and mobile devices. And it is unnecessary for master nodes to forward login request messages to the base station, or maintain a long user list. In addition, pseudonym identity is introduced to preserve user anonymity. Through clever design, our proposed scheme can prevent smart card breaches. Finally, security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.

关键词: User authentication,  User anonymity,  Smart card,  Two-tiered,  Wireless sensor network (WSN) 
[1] Kuo-Hui Yeh. A lightweight authentication scheme with user untraceability[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(4): 259-271.
[2] Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou. Analysis and design of a smart card based authentication protocol[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(12): 909-917.
[3] Xiao-lei Ma, Yin-hai Wang, Feng Chen, Jian-feng Liu. Transit smart card data mining for passenger origin information extraction[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(10): 750-760.
[4] Wei-wei FANG, Ji-ming CHEN, Lei SHU, Tian-shu CHU, De-pei QIAN. Congestion avoidance, detection and alleviation in wireless sensor networks[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(1): 63-73.