Journal of Machine and Computing


An Improved and Secured 3-Factor Authentication Scheme for WSN in IoT based Applications



Journal of Machine and Computing

Received On : 16 March 2024

Revised On : 24 April 2024

Accepted On : 25 July 2024

Published On : 05 October 2024

Volume 04, Issue 04

Pages : 953-961


Abstract


Wireless Sensor Networks (WSN) has top-notch capacity for numerous domains of utility due to the potential to sense and apprehend unattended environments. IoT is playing an increasingly more essential position in clever healthcare, smart transportation and elegant grid using WSN. Therefore, challenges like privacy and data security associated with IoT wireless sensor networks because of sensor node being captured easily, consume less computing energy and low storage. Designing a secure authentication scheme will enable secure communication in WSN. Here, we proposed a improved three-factor authentication scheme for WSN utilizing biometric, password and smart card withstand against security attacks. Subsequently, by comparing the security, functional and performance parameters of our proposed scheme to the other schemes, our scheme provides better and efficient one. Therefore, our scheme is fairly workout in real time IoT applications involved in WSN scenario.


Keywords


Session Key, Internet of Things, Mutual Authentication, ECC, Biometric, Wireless Sensor Network.


  1. Q. Xie, Z. Ding, and B. Hu, “A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things,” Security and Communication Networks, vol. 2021, pp. 1–12, Sep. 2021, doi: 10.1155/2021/4799223.
  2. B. H. Taher, H. Liu, F. Abedi, H. Lu, A. A. Yassin, and A. J. Mohammed, “A Secure and Lightweight Three‐Factor Remote User Authentication Protocol for Future IoT Applications,” Journal of Sensors, vol. 2021, no. 1, Jan. 2021, doi: 10.1155/2021/8871204.
  3. J. Mo and H. Chen, “A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks,” Security and Communication Networks, vol. 2019, pp. 1–17, Dec. 2019, doi: 10.1155/2019/2136506.
  4. L. Zhu, H. Xiang, and K. Zhang, “A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks,” Symmetry, vol. 14, no. 1, p. 46, Dec. 2021, doi: 10.3390/sym14010046.
  5. X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, and K.-K. R. Choo, “A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments,” Journal of Network and Computer Applications, vol. 103, pp. 194–204, Feb. 2018, doi: 10.1016/j.jnca.2017.07.001.
  6. M. Saqib, B. Jasra, and A. H. Moon, “A lightweight three factor authentication framework for IoT based critical applications,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 9, pp. 6925–6937, Oct. 2022, doi: 10.1016/j.jksuci.2021.07.023.
  7. J. Ryu, T. Song, J. Moon, H. Kim, and D. Won, “Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks,” Computational Science and Technology, pp. 49–58, Aug. 2018, doi: 10.1007/978-981-13-2622-6_5.
  8. Y. Chen, Y. Ge, Y. Wang, and Z. Zeng, “An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks,” IEEE Access, vol. 7, pp. 85440–85451, 2019, doi: 10.1109/access.2019.2923777.
  9. F. Wu, L. Xu, S. Kumari, and X. Li, “An improved and provably secure three-factor user authentication scheme for wireless sensor networks,” Peer-to-Peer Networking and Applications, vol. 11, no. 1, pp. 1–20, Aug. 2016, doi: 10.1007/s12083-016-0485-9.
  10. S. Challa et al., “An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks,” Computers & Electrical Engineering, vol. 69, pp. 534–554, Jul. 2018, doi: 10.1016/j.compeleceng.2017.08.003.
  11. J. Mo, Z. Hu, and W. Shen, “A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network,” IEEE Access, vol. 10, pp. 12137–12152, 2022, doi: 10.1109/access.2022.3146393.
  12. H. Kim and B. O. D. Kapito, “Security Considerations on Three-Factor Anonymous Authentication Scheme for WSNs,” Journal of Computer and Communications, vol. 09, no. 03, pp. 1–9, 2021, doi: 10.4236/jcc.2021.93001.
  13. S. Yu and Y. Park, “SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks,” Sensors, vol. 20, no. 15, p. 4143, Jul. 2020, doi: 10.3390/s20154143.
  14. Y. Lu, G. Xu, L. Li, and Y. Yang, “Anonymous three-factor authenticated key agreement for wireless sensor networks,” Wireless Networks, vol. 25, no. 4, pp. 1461–1475, Nov. 2017, doi: 10.1007/s11276-017-1604-0.
  15. M. Shuai, N. Yu, H. Wang, L. Xiong, and Y. Li, “A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications,” Journal of Organizational and End User Computing, vol. 33, no. 3, pp. 1–18, May 2021, doi: 10.4018/joeuc.20210501.oa1.
  16. S. Shin and T. Kwon, “A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes,” Sensors, vol. 19, no. 9, p. 2012, Apr. 2019, doi: 10.3390/s19092012.
  17. Q. Jiang, J. Ma, F. Wei, Y. Tian, J. Shen, and Y. Yang, “An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks,” Journal of Network and Computer Applications, vol. 76, pp. 37–48, Dec. 2016, doi: 10.1016/j.jnca.2016.10.001.
  18. A. K. Das, “A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks,” Peer-to-Peer Networking and Applications, vol. 9, no. 1, pp. 223–244, Dec. 2014, doi: 10.1007/s12083-014-0324-9.
  19. C.-H. Liu and Y.-F. Chung, “Secure user authentication scheme for wireless healthcare sensor networks,” Computers & Electrical Engineering, vol. 59, pp. 250–261, Apr. 2017, doi: 10.1016/j.compeleceng.2016.01.002.
  20. Q. Jiang, J. Ma, F. Wei, Y. Tian, J. Shen, and Y. Yang, “An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks,” Journal of Network and Computer Applications, vol. 76, pp. 37–48, Dec. 2016, doi: 10.1016/j.jnca.2016.10.001.

Acknowledgements


The authors would like to thank to the reviewers for nice comments on the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors would like to thank to the reviewers for nice comments on the manuscript.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Ramesh Sengodan, “An Improved and Secured 3-Factor Authentication Scheme for WSN in IoT based Applications”, Journal of Machine and Computing, pp. 953-961, October 2024. doi:10.53759/7669/jmc202404088.


Copyright


© 2024 Ramesh Sengodan. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.