Abstract
The new communication technologies have changed the traditional networks processes and provides more feasible, and convenient services for healthcare, agriculture, and transportation. Ad hoc networks devices have limited resources for energy, storage and processing. The conventional and traditional security solutions are not suitable for small and tiny sensor nodes. The symmetric cryptography method consumes more energy than public key cryptography method, whereas the public key cryptography method is a resource-intensive and not suitable for wireless networks. The symmetric cryptosystems have key management issues. Different authentication mechanisms have been designed but almost all of them are either complex or insecure. Improving network security with less resources consumption, there is a need to design and develop more advance and lightweight solution. This paper proposed a Biometric based User Authentication and Key Agreement Protocol (BUAKA) that uses a fuzzy extractor and one-way hash functions for sensor nodes authentication. The proposed scheme has four phases: initialization, registration, authentication, and password renewal phase. The proposed scheme resolves the complexities issues by providing a secure authentication mechanism and provide great resilience against a number of attacks. Finally, the proposed scheme is evaluated using several parameters such as security attacks, computational cost, and communication overhead to measure the effectiveness of proposed scheme.
| Original language | English |
|---|---|
| Article number | 104722 |
| Journal | Microprocessors and Microsystems |
| Volume | 96 |
| DOIs | |
| Publication status | Published - Feb 2023 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 2 Zero Hunger
Keywords
- Agreement
- Authentication
- Biometric
- Communication
- Protocol
- Security
Fingerprint
Dive into the research topics of 'An improved biometric based user authentication and key agreement scheme for intelligent sensor based wireless communication'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver