4.4 Article

A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks

Journal

Publisher

WILEY
DOI: 10.1002/cpe.6178

Keywords

anonymity; authentication and key agreement; biometrics; wireless sensor networks

Funding

  1. Natural Science Foundation of Hubei Province [2020CFA052]
  2. National Natural Science Foundation of China [61972294, 61932016]
  3. Special Project on Science and Technology Program of Hubei Provience [2020AEA013]
  4. Wuhan Municipal Science and Technology Project [2020010601012187]

Ask authors/readers for more resources

Wireless sensor networks are widely used in various fields, with security and privacy issues being a challenge. Two-factor authentication schemes have shortcomings, while three-factor authentication methods can address these deficiencies.
Wireless sensor networks (WSNs) are widespreadly applicable for information acquisition and processing in various fields such as military, healthcare, envrionment monitoring, and so on. WSNs have three main components: sensors, gateways, and users. The sensing information from sensors is transmitted to users through gateways. However, the public wireless networks are vulnerable to malicious active and passive attacks, which could bring security and privacy issues. Numerous two-factor based authentication and key agreement (AKA) protocols have been proposed to solve these issues, whereas these schemes still have some deficiencies. Three-factor based authentication method can make up for the drawbacks of two-factor based schemes. Kumari and Renuka put forward a biometrics-based AKA for WSNs with elliptic curve cryptography (ECC). But their scheme cannot maintain anonymity and resist to impersonality attack, replay attack, and DoS attack. In this article, we propose a biometrics-based anonymous AKA scheme, which is equipped with the covered security requirements of WSNs. Meanwhile, the proposed scheme are provably secure in the three-party AKA security model. Performance analysis demonstrates that our scheme has better security properties, communication cost, and computational cost compared with five recent and related schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available