JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (05): 12-17.doi: 10.6040/j.issn.1671-9352.0.2014.431

Previous Articles     Next Articles

An authentication protocol based on hybrid Das protocol for wireless sensor networks

WAN Zhi-ping   

  1. Xinhua College, Zhongshan University, Guangzhou 510520, Guangdong, China
  • Received:2014-09-25 Online:2015-05-20 Published:2015-05-29

Abstract: In order to improve the security of legitimate user access to the node data in the wireless sensor networks(WSNs), an authentication protocol hybrid Das protocol for wireless sensor networks was proposed. This protocol has a dynamic authentication protocol by one-way hash function and XOR operation to achieve the encryption/decryption performance, and it also has a characteristic that Das protocol using only a smart card to authenticate. Compared with Das protocol and dynamic authentication protocol, MDas protocol increases the password change phase, and also increases the mutual verification operation between the login node and sensor nodes during the verification phase of the agreement to enhance the authentication security. The analysis on protocol security features comparison and calculation cost showed that the MDas protocol can resist the attack of camouflage gateway replay,and it has the better security performance.

Key words: authentication protocols, dynamic authentication protocol, wireless sensor networks, Das agreement

CLC Number: 

  • TP393
[1] 张明. 一种改进的动态用户认证协议[J]. 电子学报, 2011, 24(6):137-139. ZHANG Ming. An improved dynamic user authentication protocol[J]. Electronic Science and Technology, 2011, 24(6):137-139.
[2] 李兴华, 邓凌娟, 张渊, 等. 基于博弈论的身份认证协议的分析——NGUYEN LH 方案的改进[J]. 通信学报, 2013, 34(8):18-36. LI Xinghua, DENG Lingjuan, ZHANG Yuan, et al. Rational analysis of authentication protocols based on NGUYEN LH scheme[J]. Journal on Communications, 2013, 34(8):18-36.
[3] WANG Chao, MAO Kefei, LIU Jianwei, et al. Identity-based dynamic authenticated group key agreement protocol for space information network[J].Lecture Notes in Computer Science, 2013, 7873:535-548.
[4] LI Chun-Ta, LEE Cheng-Chi, LEE Chin-Wen. An improved two-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography[J]. Sensor Letters, 2013, 11(5):958-965.
[5] WONG K H M, ZHENG Yuan, CAO Jiannong, et al.A dynamic user authentication scheme for wireless sensor networks[C]//Proceedings of the IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing. Los Alamitos: IEEE Computer Society, 2006:244-251.
[6] Binod Vaidya, Jorge S Silva, Joel J P C Rodrigues. Robust dynamic user authentication scheme for w ireless sensor networks[C]//Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks.New York: ACM Press, 2009:28-29.
[7] KO Lee-Chun. A novel dynamic user authentication scheme for wireless sensor networks[C]//Proceedings of IEEE International Symposium on Wireless Communication Systems. New York: IEEE, 2008:608-612.
[8] DAS M L. Efficient user authentication and secure data transmission in wireless sensor networks[C]//Proceedings of the 16th IEEE International Conference on Networks. New York: IEEE, 2008:1-6.
[9] KHAN M K, ALGHATHBAR K. Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks[J]. SENSORS, 2010, 10(3):2450-2459.
[10] DYANG D H, LEE M K. Improvement of Das's two-factor authentication protocol in wireless sensor networks [EB/OL]. [2014-01-22].http://eprint.iacr.org/2009/631.pdf.
[11] VAIDYA B, RODRIGUES J J, PARK J H. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN[J]. International Journal of Communication Systems, 2010, 23(9-10):1201-1222.
[12] KHAN M K, ALGHATHBAR K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks[J]. Sensors, 2010, 10(3):2450-2459.
[13] SHI Wenbo, GONG Peng. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography [J]. International Journal of Distributed Sensor Networks, 2013, 730831:1-7.
[14] YOO S G, PARK K Y, KIM J. A security-performance-balanced user authentication scheme for wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2012, 382810:1-11.
[15] DONG Qi, LIU Donggang, NING Peng. Providing DoS resistance for signature-based broadcast authentication in sensor networks[J]. ACM Transactions on Embedded Computing Systems (TECS), 2013, 12(3): 73.1-73.26.
[16] LIN Qiaomin, WANG Yangjunxiong, SHAO Xing, et al. Novel three-party password-based authenticated key exchange protocol for wireless sensor networks[J]//Communications in Computer and Information Science, 2013, 334:263-270.
[17] CHEN Tien-Ho, SHIH Wei-Kuan. A robust mutual authentication protocol for wireless sensor networks[J]. ETRI Journal, 2010, 32(5):704-712.
[1] ZHAO Feng, XU Xiu. An improved DV-hop algorithm based on iterative computation and two communication ranges for sensor network localization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 31-37.
[2] ZHOU Xian-cun, LI Ming-xi, LI Rui-xia, XU Ming-juan, LING Hai-bo. Research on the multi-point collaboration detection against replication attacks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 54-65.
[3] LI Guo-qing. A trust evaluation model based on connection number for wireless sensor networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 123-128.
[4] ZHAO Ze-mao1, LIU Yang1, ZHANG Fan1,2, ZHOU Jian-qin1, ZHANG Pin1. Research on source location privacy routing based on angle and probability in wireless sensor networks [J]. J4, 2013, 48(09): 1-9.
[5] WAN Run-ze1, LEI Jian-jun1, YUAN Cao2. An optimization strategy for managing dormant nodes in wireless sensor networks base on fuzzy clustering [J]. J4, 2013, 48(09): 17-21.
[6] L Jia-liang1,2,3, WANG Ying-long1,3, CUI Huan-qing1, WEI Nuo2,3, GUO Qiang2,3. Study on the node localization schemes of three dimensional wireless sensor networks based on particle swarm optimization [J]. J4, 2013, 48(05): 78-82.
[7] CUI Huan-qing1,2, WANG Ying-long1*, L Jia-liang1,2, WEI Nuo1. Distributed node localization based on the stochastic particle swarm optimization [J]. J4, 2012, 47(9): 51-55.
[8] GUO Xiao-dong1, DU Peng1, ZHANG Xue-fen2. A energy-efficient distributed detection and power allocation algorithm in wireless sensor networks [J]. J4, 2012, 47(9): 60-64.
[9] YAO Wu-jun1, DING Yi1,WEI Li-xian1, YANG Xiao-yuan1,2. An ARQ error control scheme based on RSSI in wireless sensor networks [J]. J4, 2011, 46(9): 61-66.
[10] ZHOU Shu-wang1,2,3, WANG Ying-long1,3, GUO Qiang1,2, WEI Nuo1,2, GUO Wen-juan1,3. A new method for localization based on network  coverage and intelligent search [J]. J4, 2010, 45(11): 27-31.
[11] GUO Wen-juan1,2, WANG Ying-long1,2, Wei Nuo1,3, GUO Qiang1,3, ZHOU Shu-wang1,2,3. A time synchronization protocol for wireless sensor  networks based on the Kalman filter [J]. J4, 2010, 45(11): 32-36.
[12] ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor  network nodes localization method [J]. J4, 2009, 44(9): 52-55.
[13] ZHANG Xian-yi ,WANG Ying-long ,GUO Qiang,ZHAO Hong-lei . Research on the indoors channel fading model in WSN [J]. J4, 2008, 43(11): 44-47 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!