Cargando…

A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited...

Descripción completa

Detalles Bibliográficos
Autores principales: Yeh, Hsiu-Lien, Chen, Tien-Ho, Liu, Pin-Chuan, Kim, Tai-Hoo, Wei, Hsin-Wen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Molecular Diversity Preservation International (MDPI) 2011
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231356/
https://www.ncbi.nlm.nih.gov/pubmed/22163874
http://dx.doi.org/10.3390/s110504767
_version_ 1782218203421736960
author Yeh, Hsiu-Lien
Chen, Tien-Ho
Liu, Pin-Chuan
Kim, Tai-Hoo
Wei, Hsin-Wen
author_facet Yeh, Hsiu-Lien
Chen, Tien-Ho
Liu, Pin-Chuan
Kim, Tai-Hoo
Wei, Hsin-Wen
author_sort Yeh, Hsiu-Lien
collection PubMed
description User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
format Online
Article
Text
id pubmed-3231356
institution National Center for Biotechnology Information
language English
publishDate 2011
publisher Molecular Diversity Preservation International (MDPI)
record_format MEDLINE/PubMed
spelling pubmed-32313562011-12-07 A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography Yeh, Hsiu-Lien Chen, Tien-Ho Liu, Pin-Chuan Kim, Tai-Hoo Wei, Hsin-Wen Sensors (Basel) Article User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. Molecular Diversity Preservation International (MDPI) 2011-05-02 /pmc/articles/PMC3231356/ /pubmed/22163874 http://dx.doi.org/10.3390/s110504767 Text en © 2011 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Yeh, Hsiu-Lien
Chen, Tien-Ho
Liu, Pin-Chuan
Kim, Tai-Hoo
Wei, Hsin-Wen
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_full A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_fullStr A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_full_unstemmed A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_short A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_sort secured authentication protocol for wireless sensor networks using elliptic curves cryptography
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231356/
https://www.ncbi.nlm.nih.gov/pubmed/22163874
http://dx.doi.org/10.3390/s110504767
work_keys_str_mv AT yehhsiulien asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT chentienho asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT liupinchuan asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT kimtaihoo asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT weihsinwen asecuredauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT yehhsiulien securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT chentienho securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT liupinchuan securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT kimtaihoo securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT weihsinwen securedauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography