Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. Therefore, many user authentication schemes in ubiquitous WSNs have been proposed. However, many user authentication schemes...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2014-04-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2014/759132 |
_version_ | 1797706003420020736 |
---|---|
author | Jun-Sub Kim Jin Kwak |
author_facet | Jun-Sub Kim Jin Kwak |
author_sort | Jun-Sub Kim |
collection | DOAJ |
description | The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. Therefore, many user authentication schemes in ubiquitous WSNs have been proposed. However, many user authentication schemes are vulnerable to impersonation attacks, parallel session attacks, password guessing attacks, stolen smart card attacks, and so forth. In this paper, we propose a secure and efficient user authentication scheme for use in ubiquitous WSNs. Our proposed scheme is secure against various attacks and provides mutual authentication and session key establishment. Furthermore, our proposed scheme is efficient at using the hash function and exclusive-OR operation. |
first_indexed | 2024-03-12T05:45:50Z |
format | Article |
id | doaj.art-b17b66e6d211429aa8e69341f25b5b1a |
institution | Directory Open Access Journal |
issn | 1550-1477 |
language | English |
last_indexed | 2024-03-12T05:45:50Z |
publishDate | 2014-04-01 |
publisher | Hindawi - SAGE Publishing |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj.art-b17b66e6d211429aa8e69341f25b5b1a2023-09-03T05:39:50ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772014-04-011010.1155/2014/759132759132Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor NetworksJun-Sub Kim0Jin Kwak1 ISAA Lab, Department of Information Security Engineering, Soonchunhyang University, Asan, Chungcheongnam-do 336-745, Republic of Korea Department of Information Security Engineering, Soonchunhyang University, Asan, Chungcheongnam-do 336-745, Republic of KoreaThe user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. Therefore, many user authentication schemes in ubiquitous WSNs have been proposed. However, many user authentication schemes are vulnerable to impersonation attacks, parallel session attacks, password guessing attacks, stolen smart card attacks, and so forth. In this paper, we propose a secure and efficient user authentication scheme for use in ubiquitous WSNs. Our proposed scheme is secure against various attacks and provides mutual authentication and session key establishment. Furthermore, our proposed scheme is efficient at using the hash function and exclusive-OR operation.https://doi.org/10.1155/2014/759132 |
spellingShingle | Jun-Sub Kim Jin Kwak Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks International Journal of Distributed Sensor Networks |
title | Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks |
title_full | Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks |
title_fullStr | Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks |
title_full_unstemmed | Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks |
title_short | Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks |
title_sort | secure and efficient user authentication scheme in ubiquitous wireless sensor networks |
url | https://doi.org/10.1155/2014/759132 |
work_keys_str_mv | AT junsubkim secureandefficientuserauthenticationschemeinubiquitouswirelesssensornetworks AT jinkwak secureandefficientuserauthenticationschemeinubiquitouswirelesssensornetworks |