z-logo
open-access-imgOpen Access
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
Author(s) -
Jun-Sub Kim,
Jin Kwak
Publication year - 2014
Publication title -
international journal of distributed sensor networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.324
H-Index - 53
eISSN - 1550-1477
pISSN - 1550-1329
DOI - 10.1155/2014/759132
Subject(s) - computer science , computer network , mutual authentication , session key , password , authentication (law) , computer security , wireless sensor network , challenge–response authentication , hash function , session (web analytics) , hash chain , scheme (mathematics) , multi factor authentication , authentication protocol , encryption , world wide web , mathematical analysis , mathematics
The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. Therefore, many user authentication schemes in ubiquitous WSNs have been proposed. However, many user authentication schemes are vulnerable to impersonation attacks, parallel session attacks, password guessing attacks, stolen smart card attacks, and so forth. In this paper, we propose a secure and efficient user authentication scheme for use in ubiquitous WSNs. Our proposed scheme is secure against various attacks and provides mutual authentication and session key establishment. Furthermore, our proposed scheme is efficient at using the hash function and exclusive-OR operation.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom