JOURNAL ARTICLE

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

Tien‐Ho Chen

Year: 2010 Journal:   ETRI Journal Vol: 32 (5)Pages: 704-712   Publisher: Electronics and Telecommunications Research Institute

Abstract

Authentication is an important service in wireless sensor networks (WSNs) for an unattended environment. Recently, Das proposed a hash-based authentication protocol for WSNs, which provides more security against the masquerade, stolen-verifier, replay, and guessing attacks and avoids the threat which comes with having many logged-in users with the same login-id. In this paper, we point out one security weakness of Das' protocol in mutual authentication for WSN's preservation between users, gateway-node, and sensor nodes. To remedy the problem, this paper provides a secrecy improvement over Das' protocol to ensure that a legal user can exercise a WSN in an insecure environment. Furthermore, by presenting the comparisons of security, computation and communication costs, and performances with the related protocols, the proposed protocol is shown to be suitable for higher security WSNs.

Keywords:
Computer network Computer science Mutual authentication Authentication protocol Challenge-Handshake Authentication Protocol Replay attack Computer security Wireless sensor network Wide Mouth Frog protocol Otway–Rees protocol Protocol (science) Authentication (law)

Metrics

252
Cited By
12.24
FWCI (Field Weighted Citation Impact)
19
Refs
0.99
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Security in Wireless Sensor Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
© 2026 ScienceGate Book Chapters — All rights reserved.