Next Article in Journal
Enhancement of Low Contrast Images Based on Effective Space Combined with Pixel Learning
Previous Article in Journal
Feature Encodings and Poolings for Action and Event Recognition: A Comprehensive Survey
Article Menu

Export Article

Open AccessArticle
Information 2017, 8(4), 136; doi:10.3390/info8040136

Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things

1
Center for Mobile Banking, Institute for Development and Research in Banking Technology, Hyderabad 500057, India
2
Artificial Intelligence Lab, School of Computer and Information Sciences, University of Hyderabad, Hyderabad 500046, India
*
Author to whom correspondence should be addressed.
Received: 21 September 2017 / Revised: 17 October 2017 / Accepted: 24 October 2017 / Published: 30 October 2017
(This article belongs to the Section Information and Communications Technology)
View Full-Text   |   Download PDF [501 KB, uploaded 9 November 2017]   |  

Abstract

To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015), Choi et al.’s scheme (given in 2016), and Park et al.’s scheme (given in 2016). The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN) logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT. View Full-Text
Keywords: Wireless Sensor Networks(WSNs); Internet of Things (IoT); user authentication; session key; smart card; fuzzy extractor; hash function Wireless Sensor Networks(WSNs); Internet of Things (IoT); user authentication; session key; smart card; fuzzy extractor; hash function
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Maurya, A.K.; Sastry, V.N. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things. Information 2017, 8, 136.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top