A dynamic user authentication scheme for wireless sensor networks

Kirk H.M. Wong, Zheng Yuan, Cao Jiannong, Shengwei Wang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

286 Citations (Scopus)


In this paper, we consider User Authentication (UA) for wireless sensor networks. UA is a fundamental issue in designing dependable and secure systems. Imagine that a wireless sensor network is deployed in an intelligent building, a hospital, or even a university campus, to allow legitimate users to send queries and retrieve the respective result at any of the sensor nodes. Importantly, the system needs to provide a means of user authentication to verify if the user is valid. We propose a dynamic strong-password based solution to this access control problem and adapt it into a wireless sensor network environment. The proposed strong-password authentication approach imposes very light computational load and requires simple operations, such as one-way hash function and exclusive-OR operations. We present the design of the proposed scheme and discuss how to make use of the security features on MAC sublayer (Medium Access Control) based on the IEEE 802.15.4 specification. Analysis on security and communication costs is presented to evaluate the effectiveness of the proposed scheme.
Original languageEnglish
Title of host publicationProceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
Number of pages8
Volume2006 II
Publication statusPublished - 15 Dec 2006
EventIEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Taichung, Taiwan
Duration: 5 Jun 20067 Jun 2006


ConferenceIEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing


  • IEEE 802.15.4 specification
  • Security
  • Sensor networks
  • User authentication

ASJC Scopus subject areas

  • General Engineering


Dive into the research topics of 'A dynamic user authentication scheme for wireless sensor networks'. Together they form a unique fingerprint.

Cite this