Next Article in Journal
Adaptive Sparse Representation for Source Localization with Gain/Phase Errors
Previous Article in Journal
Electronic Noses and Tongues: Applications for the Food and Pharmaceutical Industries
Previous Article in Special Issue
Study on the Context-Aware Middleware for Ubiquitous Greenhouses Using Wireless Sensor Networks
Sensors 2011, 11(5), 4767-4779; doi:10.3390/s110504767
Article

A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

1,* , 2
, 2
, 3
 and 4
Received: 30 March 2011; in revised form: 25 April 2011 / Accepted: 26 April 2011 / Published: 2 May 2011
View Full-Text   |   Download PDF [348 KB, uploaded 21 June 2014]   |   Browse Figure
Abstract: User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
Keywords: authentication; security; ECC; wireless sensor network authentication; security; ECC; wireless sensor network
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Export to BibTeX |
EndNote


MDPI and ACS Style

Yeh, H.-L.; Chen, T.-H.; Liu, P.-C.; Kim, T.-H.; Wei, H.-W. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Sensors 2011, 11, 4767-4779.

AMA Style

Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Sensors. 2011; 11(5):4767-4779.

Chicago/Turabian Style

Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen. 2011. "A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography." Sensors 11, no. 5: 4767-4779.


Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert