An improved dynamic user authentication scheme for wireless sensor networks

Huei Ru Tseng*, Rong Hong Jan, Wuu Yang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

167 Scopus citations

Abstract

Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for wireless sensor networks. Recently, Wong et al. proposed a dynamic user authentication scheme for WSNs that allows legitimate users to query sensor data at every sensor node of the network. We show that Wong et al.'s scheme is vulnerable to the replay and forgery attacks and propose a lightweight dynamic user authentication scheme for WSNs. The proposed scheme not only retains all the advantages in Wong et al.'s scheme but also enhances its security by withstanding the security weaknesses and allows legitimate users to change their passwords freely. In comparison with the previous scheme, our proposed scheme possesses many advantages, including resistance of the replay and forgery attacks, reduction of user's password leakage risk, capability of changeable password, and better efficiency.

Original languageEnglish
Title of host publicationIEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
Pages986-990
Number of pages5
DOIs
StatePublished - 1 Dec 2007
Event50th Annual IEEE Global Telecommunications Conference, GLOBECOM 2007 - Washington, DC, United States
Duration: 26 Nov 200730 Nov 2007

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Conference

Conference50th Annual IEEE Global Telecommunications Conference, GLOBECOM 2007
CountryUnited States
CityWashington, DC
Period26/11/0730/11/07

Keywords

  • Password
  • Replay and forgery attacks
  • User-authentication
  • Wireless sensor networks

Fingerprint Dive into the research topics of 'An improved dynamic user authentication scheme for wireless sensor networks'. Together they form a unique fingerprint.

Cite this