JOURNAL ARTICLE

A Secure Biometric Based User Authentication Protocol in Wireless Sensor Networks

Sungjin YuJoonyoung LeeMyeonghyun KimYoungho Park

Year: 2020 Journal:   2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pages: 0830-0834

Abstract

With the development of Information and Communication Technology (ICT) and low-power devices, users can access the internet of things (IoT) services provided in various environments such as smart factory, smart health-care, and smart home. However, users cannot withstand various attacks, because sensitive information is transmitted through an open channel. Therefore, secure authentication schemes are essential to provide IoT services for legal users. In 2019, Banerjee et al. proposed an enhanced and secure authentication protocol in wireless sensor networks (WSN) using smart card. They claimed that their protocol can resist against various attacks such as user impersonation and session key disclosure attacks and cannot provide achieve mutual authentication. However, we demonstrated that Banerjee et al.'s protocol cannot prevent various attacks, including impersonation and session key disclosure attacks and cannot achieve mutual authentication. Therefore, we propose a secure biometric based user authentication protocol in wireless sensor networks to resolve these security flaws of Banerjee et al.'s protocol. We prove that our protocol can prevent various attacks such as smart card stolen attack, user impersonation attack, session key disclosure attack and replay attack and provide secure mutual authentication using informal security analysis. In addition, we compare the performance and security features of the proposed scheme with related schemes. We show that the proposed scheme provides slightly higher than Banerjee et al.'s scheme. Furthermore, we demonstrate that the proposed protocol provides better safety than related schemes. Consequently, our protocol can be suitable for practical IoT based WSN environment.

Keywords:
Mutual authentication Computer science Computer security Authentication protocol Session key Authentication (law) Replay attack Computer network Smart card Reflection attack Otway–Rees protocol Key (lock) Challenge-Handshake Authentication Protocol Wireless sensor network Session (web analytics) Encryption World Wide Web

Metrics

8
Cited By
1.96
FWCI (Field Weighted Citation Impact)
9
Refs
0.86
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Provably secure biometric based authentication and key agreement protocol for wireless sensor networks

Srinivas JangiralaDheerendra MishraSourav MukhopadhyaySaru Kumari

Journal:   Journal of Ambient Intelligence and Humanized Computing Year: 2017 Vol: 9 (4)Pages: 875-895
JOURNAL ARTICLE

A biometric-based user authentication for wireless sensor networks

Jianjun YuanChangjun JiangZuowen Jiang

Journal:   Wuhan University Journal of Natural Sciences Year: 2010 Vol: 15 (3)Pages: 272-276
JOURNAL ARTICLE

Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks

Eun‐Jun YoonCheonshik Kim

Journal:   Sensor Letters Year: 2013 Vol: 11 (9)Pages: 1836-1843
JOURNAL ARTICLE

Secure and Efficient Mutual User Authentication Protocol for Wireless Sensor Networks

Qinghua YangLiejun WangQi LiuMing‐Wei Wang

Journal:   Journal of Software Engineering Year: 2014 Vol: 8 (3)Pages: 184-193
© 2026 ScienceGate Book Chapters — All rights reserved.