Table of Content

Open AccessOpen Access


A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

Tao Liu, Gan Huang*, Ping Zhang

School of Computer and Information, Anhui Polytechnic University, Wuhu, China

* Corresponding Author: Gan Huang,

Intelligent Automation & Soft Computing 2018, 24(3), 519-529.


In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the security and the performance.


Cite This Article

T. Liu, . G. Huang and . P. Zhang, "A user authentication protocol combined with the trust model, biometrics and ecc for wireless sensor networks," Intelligent Automation & Soft Computing, vol. 24, no.3, pp. 519–529, 2018.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1097


  • 638


  • 0


Share Link

WeChat scan