Survey on user authentication protocol in wireless sensor network

In wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. Howe...

Full description

Saved in:
Bibliographic Details
Main Authors: Wei-dong FANG, Wu-xiong ZHANG, Lian-hai SHAN, Wei HE, Wei CHEN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-01-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00129
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530326510206976
author Wei-dong FANG
Wu-xiong ZHANG
Lian-hai SHAN
Wei HE
Wei CHEN
author_facet Wei-dong FANG
Wu-xiong ZHANG
Lian-hai SHAN
Wei HE
Wei CHEN
author_sort Wei-dong FANG
collection DOAJ
description In wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. However, since the sensor nodes have limited energy, communications and computing capacity, and they are usually deployed in hostile or unattended environment, the traditional user authentication protocol (UAP) is not entirely suitable for WSN. The security attacks were introduced for the UAP in WSN, its secure requirements and the theoretical foundation were given, and then the UAP's design processes were summarized. For the analysis of its security, the attack model was described, and the automated vali-dation of internet Security protocols and applications (AVISPA) and the high level protocols specification language (HLPSL) were overviewed in detail. Then, the current UAPs were reviewed in WSN, the future research directions were proposed. These researches will contribute to the design, analysis and optimization for the UAP in WSN.
format Article
id doaj-art-d757520bc3fb4c19b7d42be5ed14e0ae
institution Kabale University
issn 2096-109X
language English
publishDate 2017-01-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-d757520bc3fb4c19b7d42be5ed14e0ae2025-01-15T03:05:26ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-01-01311259549447Survey on user authentication protocol in wireless sensor networkWei-dong FANGWu-xiong ZHANGLian-hai SHANWei HEWei CHENIn wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. However, since the sensor nodes have limited energy, communications and computing capacity, and they are usually deployed in hostile or unattended environment, the traditional user authentication protocol (UAP) is not entirely suitable for WSN. The security attacks were introduced for the UAP in WSN, its secure requirements and the theoretical foundation were given, and then the UAP's design processes were summarized. For the analysis of its security, the attack model was described, and the automated vali-dation of internet Security protocols and applications (AVISPA) and the high level protocols specification language (HLPSL) were overviewed in detail. Then, the current UAPs were reviewed in WSN, the future research directions were proposed. These researches will contribute to the design, analysis and optimization for the UAP in WSN.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00129WSNsecurityuser authentication protocoltwo-factorsthree-factors
spellingShingle Wei-dong FANG
Wu-xiong ZHANG
Lian-hai SHAN
Wei HE
Wei CHEN
Survey on user authentication protocol in wireless sensor network
网络与信息安全学报
WSN
security
user authentication protocol
two-factors
three-factors
title Survey on user authentication protocol in wireless sensor network
title_full Survey on user authentication protocol in wireless sensor network
title_fullStr Survey on user authentication protocol in wireless sensor network
title_full_unstemmed Survey on user authentication protocol in wireless sensor network
title_short Survey on user authentication protocol in wireless sensor network
title_sort survey on user authentication protocol in wireless sensor network
topic WSN
security
user authentication protocol
two-factors
three-factors
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00129
work_keys_str_mv AT weidongfang surveyonuserauthenticationprotocolinwirelesssensornetwork
AT wuxiongzhang surveyonuserauthenticationprotocolinwirelesssensornetwork
AT lianhaishan surveyonuserauthenticationprotocolinwirelesssensornetwork
AT weihe surveyonuserauthenticationprotocolinwirelesssensornetwork
AT weichen surveyonuserauthenticationprotocolinwirelesssensornetwork