SUMMARYOwing to the ubiquitous nature, ease of deployment, and wide range of potential applications, wireless sensor networks (WSNs) have received a lot of attention recently. WSNs can be deployed in unattended environments; however, they have many challenges. It should be guaranteed that not only illegitimate users cannot login and access data in the network but also user privacy should be maintained. Since sensor nodes have limited computation power, storage, and energy, it is desirable for the authentication protocol to be simple and secure. In this paper, we propose two user authentication protocols that are variations of a recent strong-password-based solution. It uses one-way hash functions and XOR operations to achieve lower computational and communication overheads. We have analyzed the performance of both the proposed authentication schemes in terms of various metrics. We have also provided security evaluation of the proposed protocols. Comparing with the previous schemes, our proposed schemes are more robust and provide better security.
Wireless sensor networks (WSNs) are getting popular for their deployment in unattended environments, where a registered user can log in to the network and access data collected from the desired sensor. Because of limited resources and computation power in sensor nodes, an authentication protocol should be simple and efficient. M.L. Das proposed a two-factor authentication scheme for WSNs. Because his scheme uses only one-way hash function and XOR operation, it is well suited for resourceconstrained environments. Because of some flaws in Das's scheme, several improved schemes have been introduced. In this paper, we show that Das's scheme and its derivatives not only have security imperfections but also do not provide key agreement. To overcome their security shortcomings, we propose a novel user authentication scheme with key agreement for WSN. We furnish security analysis of the proposed protocol to show its robustness to various attacks as well as analyze its performance to determine its efficiency. We provide protocol analysis and verification of the proposed protocol. Compared with the existing schemes, it is more robust and offers better security.
Smart Energy Home Area Networks (SE-HAN) enable two-way communication between utility companies and HAN devices. Due to multifaceted nature of SE-HAN, securely managing SE-HAN is very challenging. In this paper, we propose a device authentication mechanism for smart energy home area network. The proposed mechanism is more robust and secure than the existing one.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.