z-logo
Premium
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
Author(s) -
Vaidya Binod,
Rodrigues Joel J.,
Park Jong Hyuk
Publication year - 2009
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.1097
Subject(s) - computer science , computer network , authentication (law) , wireless sensor network , authentication protocol , password , protocol (science) , hash function , simple (philosophy) , computer security , medicine , alternative medicine , pathology , philosophy , epistemology
Owing to the ubiquitous nature, ease of deployment, and wide range of potential applications, wireless sensor networks (WSNs) have received a lot of attention recently. WSNs can be deployed in unattended environments; however, they have many challenges. It should be guaranteed that not only illegitimate users cannot login and access data in the network but also user privacy should be maintained. Since sensor nodes have limited computation power, storage, and energy, it is desirable for the authentication protocol to be simple and secure. In this paper, we propose two user authentication protocols that are variations of a recent strong‐password‐based solution. It uses one‐way hash functions and XOR operations to achieve lower computational and communication overheads. We have analyzed the performance of both the proposed authentication schemes in terms of various metrics. We have also provided security evaluation of the proposed protocols. Comparing with the previous schemes, our proposed schemes are more robust and provide better security. Copyright © 2009 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here