{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:36:40Z","timestamp":1774604200797,"version":"3.50.1"},"reference-count":20,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2011,5,2]],"date-time":"2011-05-02T00:00:00Z","timestamp":1304294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das\u2019 protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.<\/jats:p>","DOI":"10.3390\/s110504767","type":"journal-article","created":{"date-parts":[[2011,5,4]],"date-time":"2011-05-04T09:03:57Z","timestamp":1304499837000},"page":"4767-4779","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":300,"title":["A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography"],"prefix":"10.3390","volume":"11","author":[{"given":"Hsiu-Lien","family":"Yeh","sequence":"first","affiliation":[{"name":"Institute of Information System and Applications, National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, HsinChu, 30013, Taiwan"}]},{"given":"Tien-Ho","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science , National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, HsinChu, 30013, Taiwan"}]},{"given":"Pin-Chuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science , National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, HsinChu, 30013, Taiwan"}]},{"given":"Tai-Hoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Multimedia Engineering, Hannam University, No.133 Ojeong-dong, Daeduk-gu, Daejeon 306-791, Korea"}]},{"given":"Hsin-Wen","family":"Wei","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Academia Sinica Taipei, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2011,5,2]]},"reference":[{"key":"ref_1","unstructured":"Callaway, EH (2003). Wireless Sensor Networks, Architectures and Protocols, Auerbach Publications; Taylor & Francis Group."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","article-title":"Wireless Sensor Network Survey","volume":"52","author":"Yick","year":"2008","journal-title":"Comput. Network"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.adhoc.2005.01.002","article-title":"Clock Synchronization for Wireless Sensor Network: A Survey","volume":"3","author":"Sundararaman","year":"2005","journal-title":"Ad-Hoc Networks"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2004.91","article-title":"Environmental Sensor Networks","volume":"37","author":"Martinez","year":"2004","journal-title":"Computer"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/990680.990704","article-title":"Habitat Monitoring with Sensor Networks","volume":"47","author":"Szewezyk","year":"2004","journal-title":"Commun. ACM"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","article-title":"A Dynamic Id-Based Remote User Authentication Scheme","volume":"50","author":"Das","year":"2004","journal-title":"IEEE Trans. Consum. Electron"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1109\/TCE.2003.1261224","article-title":"Cryptanalysis of a Modified Remote User Authentication Scheme Using Smart Cards","volume":"49","author":"Leung","year":"2003","journal-title":"IEEE Trans. Consum. Electron"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","article-title":"A Survey on Sensor Networks","volume":"40","author":"Akyildiz","year":"2002","journal-title":"IEEE Commun. Mag"},{"key":"ref_9","unstructured":"Sastry, N, and Wagner, D (2004). Proceedings of ACM Workshop on Wireless Security."},{"key":"ref_10","unstructured":"Watro, R, Kong, D, Cuti, S-F, Gardiner, C, Lynn, C, Kruus, P, and Tiny, PK (Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004). Securing Sensor Networks with Public Key Technology, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks."},{"key":"ref_11","unstructured":"Wong, KHM, Zheng, Y, Cao, J, and Wang, S (2006, January 5\u20137). A Dynamic User Authentication Scheme for Wireless Sensor Networks. Taichung, Taiwan."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","article-title":"Two-Factor User Authentication in Wireless Sensor Networks","volume":"8","author":"Das","year":"2009","journal-title":"IEEE Trans. Wirel. Commun"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Tseng, HR, Jan, RH, and Yang, W (2007, January 26\u201330). An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks. Washington, DC, USA.","DOI":"10.1109\/GLOCOM.2007.190"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Khan, MK, and Alghathbar, K (2010, January 23\u201325). Security Analysis of Two-Factor Authentication in Wireless Sensor Networks. Miyazaki, Japan.","DOI":"10.1007\/978-3-642-13577-4_5"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","article-title":"Cryptanalysis and Security Improvements of \u2018Two-Factor User Authentication in Wireless Sensor Networks\u2019","volume":"10","author":"Khan","year":"2010","journal-title":"Sensors J"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","article-title":"A Robust Mutual Authentication Protocol for Wireless Sensor Networks","volume":"32","author":"Chen","year":"2010","journal-title":"ETRI J"},{"key":"ref_17","unstructured":"(2003). Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks, IEEE."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic Curve Cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput"},{"key":"ref_19","unstructured":"Miller, VS (1986). Advances in Cryptology\u2014CRYPTO '85: Proceedings, Springer. LNCS Cryptography Volume."},{"key":"ref_20","unstructured":"Menezes, AJ, Oorschot, PC, and Vanstone, SA (1997). Handbook of Applied Cryptography, CRC Press Inc."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/11\/5\/4767\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:55:58Z","timestamp":1760219758000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/11\/5\/4767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,2]]},"references-count":20,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2011,5]]}},"alternative-id":["s110504767"],"URL":"https:\/\/doi.org\/10.3390\/s110504767","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5,2]]}}}