A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks

The uses of wireless sensor networks have increased to be applicable in many different areas, such as military applications, ecology, and health applications. These applications often include the management of confidential information, making the issue of security one of the most important aspects t...

Full description

Bibliographic Details
Main Authors: Sang Guun Yoo, Keun Young Park, Juho Kim
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2012-03-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2012/382810
Description
Summary:The uses of wireless sensor networks have increased to be applicable in many different areas, such as military applications, ecology, and health applications. These applications often include the management of confidential information, making the issue of security one of the most important aspects to consider. In this aspect, a user authentication mechanism that allows only legitimate users to access the network data becomes critical for maintaining the confidentiality and integrity of the network information. In this paper, we describe and cryptoanalyze previous works in user authentication to illustrate their vulnerabilities and security flaws. We then propose a robust user authentication scheme that solves the identified limitations. Additionally, we describe how the proposed protocol is more suitable for a secure sensor network implementation by analysis in terms of security and performance.
ISSN:1550-1477