
Two‐factor mutual authentication with key agreement in wireless sensor networks
Author(s) -
Vaidya Binod,
Makrakis Dimitrios,
Mouftah Hussein
Publication year - 2012
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.517
Subject(s) - computer science , mutual authentication , wireless sensor network , authentication protocol , computer network , authentication (law) , robustness (evolution) , hash function , key (lock) , security analysis , protocol (science) , key agreement protocol , forward secrecy , computer security , public key cryptography , key distribution , encryption , medicine , biochemistry , chemistry , alternative medicine , pathology , gene
Wireless sensor networks (WSNs) are getting popular for their deployment in unattended environments, where a registered user can log in to the network and access data collected from the desired sensor. Because of limited resources and computation power in sensor nodes, an authentication protocol should be simple and efficient. M.L. Das proposed a two‐factor authentication scheme for WSNs. Because his scheme uses only one‐way hash function and XOR operation, it is well suited for resource‐constrained environments. Because of some flaws in Das's scheme, several improved schemes have been introduced. In this paper, we show that Das's scheme and its derivatives not only have security imperfections but also do not provide key agreement. To overcome their security shortcomings, we propose a novel user authentication scheme with key agreement for WSN. We furnish security analysis of the proposed protocol to show its robustness to various attacks as well as analyze its performance to determine its efficiency. We provide protocol analysis and verification of the proposed protocol. Compared with the existing schemes, it is more robust and offers better security. Copyright © 2012 John Wiley & Sons, Ltd.