Back Issues 11-20
AN EFFICIENT USER AUTHENTICATICATION SCHEME FOR MULTIPLE ACCESSES SCENARIO IN WSN BASED IN IOT NOTION
AN EFFICIENT USER AUTHENTICATICATION SCHEME
FOR MULTIPLE ACCESSES SCENARIO
IN WSN BASED IN IOT NOTION
Sheng-Kai Yang
1 Assistant Professor, Department of Information management, Chia Nan University of Pharmacy and Science, Tainan, Taiwan, ROC
This email address is being protected from spambots. You need JavaScript enabled to view it.
Chuan-Gang Liu*
2 Associate Professor, Department of applied informatics and multimedia, Chia Nan University of Pharmacy and Science, Tainan, Taiwan, ROC
*Corresponding author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Tsung-Lin Lee
3 Professor, Department of Architecture, China University of Science and Technology, Taipei, Taiwan, ROC
This email address is being protected from spambots. You need JavaScript enabled to view it.
Abstract
Internet of Things notion is an emerging and popular concept, which is composed of heterogeneous networks. Wireless sensor network plays a vital role in such notion, where the users can directly send control commands and gather senseddata to and from deployed sensors, respectively. Hence, in such network, access security is much more essential and the user authentication scheme is one of popular security topics in WSN. Previous authentication works usually focus on one user to one sensor accessing scenario. However, for future IoT applications, such as smart-home, there are a large number of sensor nodes in WSN architecture, where one user usually wants to control multiple sensor devices in a short time or at the same time. In such network phenomenon, we call it as multiple accesses scenario. Accordingly, this paper proposes an authentication and key agreement scheme which enables a remote user to efficiently complete multiple authentication processes at a time in the multiple accesses scenario. This proposed authentication scheme is suitable for the resource-constrained WSN architecture. Further, our scheme also considers the security flaws of two-factor authentication and designs a stronger security protection. In our security feature and performance evaluation, our proposed scheme achieves several security goals and, meanwhile, ensures the efficiency.
Key Words: Internet of Things, Wireless sensor network, two-factor authentication