2018
DOI: 10.3837/tiis.2018.04.021
|View full text |Cite
|
Sign up to set email alerts
|

A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks

Abstract: Heterogeneous wireless sensor networks (HEWSN) is a kind of wireless sensor networks (WSN), each sensor may has different attributes, HEWSN has been widely used in many aspects. Due to sensors are deployed in unattended environments and its resource constrained feature, the design of security and efficiency balanced authentication scheme for HEWSN becomes a vital challenge. In this paper, we propose a secure and lightweight user authentication and key agreement scheme based on biometric for HEWSN. Firstly, fuz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Although the scheme in 13 is shown to resist DoS attacks, its numerous point multiplications can lead to high computation costs. Similarly, the fuzzy extractor based protocol in 63 incurs heavy computation overheads 32 . On the other hand, identity-based schemes have key escrow problems 64 .…”
Section: Related Workmentioning
confidence: 99%
“…Although the scheme in 13 is shown to resist DoS attacks, its numerous point multiplications can lead to high computation costs. Similarly, the fuzzy extractor based protocol in 63 incurs heavy computation overheads 32 . On the other hand, identity-based schemes have key escrow problems 64 .…”
Section: Related Workmentioning
confidence: 99%
“…Figure 8 shows that if the fingerprint sensor contains the encryption block and transmits the encrypted fingerprint image through communication port, even if a communication port interception hack occurs, the biometric authentication information is encrypted. In this case, actual biometric information hacking does not occur because the fingerprint image cannot be restored without the authentication key [12,19]. Through this, authentication information hacking can be fundamentally blocked.…”
Section: B Enhancement Of Biometric Securitymentioning
confidence: 99%
“…Several other schemes [11][12][13] encountered similar limitations. To address this challenge, several lightweight novel approaches (e.g., [16][17][18][19][20][21]) have been proposed in which the parameter of the shared secret is known only to the sender and receiver. In this technique, the user's authentic identity is encoded into ciphertext, safeguarding their anonymity.…”
Section: Related Workmentioning
confidence: 99%