Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Secured and flexible user authentication protocol for wireless sensor network

Secured and flexible user authentication protocol for wireless sensor network In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.Design/methodology/approachIn previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.FindingsHere, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.Originality/valueThe foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Intelligent Unmanned Systems Emerald Publishing

Secured and flexible user authentication protocol for wireless sensor network

Loading next page...
 
/lp/emerald-publishing/secured-and-flexible-user-authentication-protocol-for-wireless-sensor-7QcneSl0au

References (26)

Publisher
Emerald Publishing
Copyright
© Emerald Publishing Limited
ISSN
2049-6427
DOI
10.1108/ijius-10-2019-0058
Publisher site
See Article on Publisher Site

Abstract

In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.Design/methodology/approachIn previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.FindingsHere, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.Originality/valueThe foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.

Journal

International Journal of Intelligent Unmanned SystemsEmerald Publishing

Published: Nov 4, 2020

Keywords: User authentication; Secured protocol; Random key generation; Cryptography complexity; User hacking

There are no references for this article.