JOURNAL ARTICLE

ECC-based User Authentication Scheme for Wireless Sensor Networks

Imanbaev TemirlanYue Li

Year: 2017 Journal:   International Journal of Engineering Research and Science Vol: 3 (6)Pages: 21-28

Abstract

In 2016, Akansha S. et al. proposed an upgraded user authentication protocol.According to the implemented cryptanalysis on their scheme, some vulnerabilities have been found in registration and authentication part.In registra-tion part, the gateway uses generated value as secrecy and sends it to sensor node, which doesn't have infor-mation about received secret value and cannot verify its identity.In authentication part, user is unable to check legiti-macy of received session key generated by sensor node.Mainly, the protocol has been implemented using only one way hash function, XOR and concatenation operations, which is not adequate to provide authentication and confidentiality.In this paper, we suggest ECC-based user authentication scheme for WSNs, which eliminates the drawbacks of the previous scheme.The protocol decreases the high cost public-key operations of the sensor node and substitutes them with symmetric-key based operations.

Keywords:
Scheme (mathematics) Computer network Computer science Wireless sensor network Authentication (law) Computer security Mathematics

Metrics

5
Cited By
0.24
FWCI (Field Weighted Citation Impact)
17
Refs
0.55
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Security in Wireless Sensor Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks

Eun‐Jun YoonCheonshik Kim

Journal:   Sensor Letters Year: 2013 Vol: 11 (9)Pages: 1836-1843
JOURNAL ARTICLE

Enhanced User Authentication Scheme for Wireless Sensor Networks

Hee-Joo Park

Journal:   International Journal of Security and Its Applications Year: 2015 Vol: 9 (8)Pages: 367-374
© 2026 ScienceGate Book Chapters — All rights reserved.