An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN

Wireless sensor networks (WSNs) are progressive ad hoc networks that comprise of distributed sensors that are typically and randomly deployed over the target region. The valuable information from the sensor nodes is allowed to access with the help of gateway node by the registered user. To ensure se...

Full description

Bibliographic Details
Main Author: Majid Alotaibi
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8529179/
Description
Summary:Wireless sensor networks (WSNs) are progressive ad hoc networks that comprise of distributed sensors that are typically and randomly deployed over the target region. The valuable information from the sensor nodes is allowed to access with the help of gateway node by the registered user. To ensure secure communication, a session key is exchanged between the participants over the insecure channel. In this paper, we identified some deficiencies in Jung et al.'s scheme and then devised an enhanced biometric-based anonymous user authentication and the key agreement scheme that is also embedded with symmetric cryptosystem for WSNs. The advantage of using biometric login is to ensure the legal user's efficient login. We conferred about preserving the security of our proposed scheme, we primarily applied formal verification BAN-logic method to check the exactness of mutual authentication. Furthermore, used automated validation of internet security protocols and applications software that is widely accepted and its results confirm that our scheme is secure against active and passive attacks, including forgery, replay, and man-in-the-middle attack. In addition, an informal analysis proves our scheme can withstand various possible attacks on authentication protocols over the insecure channel. Furthermore, our scheme is more appropriate for WSNs based upon the comparison of computational efficiency and security requirements with recent results.
ISSN:2169-3536