Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (1): 1-12.doi: 10.11959/j.issn.2096-109x.2017.00129

• Overview •     Next Articles

Survey on user authentication protocol in wireless sensor network

Wei-dong FANG1,Wu-xiong ZHANG1,2(),Lian-hai SHAN1,3,Wei HE1,Wei CHEN4   

  1. 1 Key Laboratory of Wireless Sensor Network&Communication, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 200051, China
    2 Shanghai Research Center for Wireless Communication, Shanghai 201210,China
    3 Shanghai Internet of Things Co., Ltd, Shanghai 201899, China
    4 School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, China
  • Revised:2016-11-25 Online:2017-01-15 Published:2020-03-20
  • Supported by:
    The National Natural Science Foundation of China(61471346);Shanghai Natural Science Foundation(14ZR1439700);The National Science and Technology Major Project(2014ZX03005001);Shanghai Municipal Scienceand Technology Committee Program(15DZ1100400);Science and Technology Service Network Program of CAS(kfj-sw-sts-155);The National Natural Science Foundation andShanxi Provincial People’s Government Jointly Funded Projectof China for Cool Base and Low Carbon(U1510115)

Abstract:

In wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. However, since the sensor nodes have limited energy, communications and computing capacity, and they are usually deployed in hostile or unattended environment, the traditional user authentication protocol (UAP) is not entirely suitable for WSN. The security attacks were introduced for the UAP in WSN, its secure requirements and the theoretical foundation were given, and then the UAP's design processes were summarized. For the analysis of its security, the attack model was described, and the automated vali-dation of internet Security protocols and applications (AVISPA) and the high level protocols specification language (HLPSL) were overviewed in detail. Then, the current UAPs were reviewed in WSN, the future research directions were proposed. These researches will contribute to the design, analysis and optimization for the UAP in WSN.

Key words: WSN, security, user authentication protocol, two-factors, three-factors

CLC Number: 

No Suggested Reading articles found!