AN EFFICIENT USER AUTHENTICATICATION SCHEME 

FOR MULTIPLE ACCESSES SCENARIO 

IN WSN BASED IN IOT NOTION

Sheng-Kai Yang

1 Assistant Professor, Department of Information management, Chia Nan University of Pharmacy and Science, Tainan, Taiwan, ROC

This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Chuan-Gang Liu*

2 Associate Professor, Department of applied informatics and multimedia, Chia Nan University of Pharmacy and Science, Tainan, Taiwan, ROC

*Corresponding author: This email address is being protected from spambots. You need JavaScript enabled to view it.

Tsung-Lin Lee

3 Professor, Department of Architecture, China University of Science and Technology, Taipei, Taiwan, ROC

This email address is being protected from spambots. You need JavaScript enabled to view it.

Abstract

Internet of Things notion is an emerging and popular concept, which is composed of heterogeneous networks. Wireless sensor network plays a vital role in such notion, where the users can directly send control commands and gather senseddata to and from deployed sensors, respectively. Hence, in such network, access security is much more essential and the user authentication scheme is one of popular security topics in WSN. Previous authentication works usually focus on one user to one sensor accessing scenario. However, for future IoT applications, such as smart-home, there are a large number of sensor nodes in WSN architecture, where one user usually wants to control multiple sensor devices in a short time or at the same time. In such network phenomenon, we call it as multiple accesses scenario. Accordingly, this paper proposes an authentication and key agreement scheme which enables a remote user to efficiently complete multiple authentication processes at a time in the multiple accesses scenario. This proposed authentication scheme is suitable for the resource-constrained WSN architecture. Further, our scheme also considers the security flaws of two-factor authentication and designs a stronger security protection. In our security feature and performance evaluation, our proposed scheme achieves several security goals and, meanwhile, ensures the efficiency.

Key Words: Internet of Things, Wireless sensor network, two-factor authentication

Attachments:
Download this file (1027 Final.pdf)1027 Final.pdf[ ]220 kB
Go to Top
JSN Solid 2 is designed by JoomlaShine.com | powered by JSN Sun Framework