Cryptanalysis of a strong authentication scheme with user privacy for wireless sensor networks

被引:0
|
作者
Xu, Chengbo [1 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan 250022, Shandong, Peoples R China
来源
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON SENSORS, MECHATRONICS AND AUTOMATION (ICSMA 2016) | 2016年 / 136卷
关键词
authentication; password; smart card; session key agreement; wireless sensor netwoks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication and key agreement scheme is an important mechanism for legal users to access the services of wireless sensor network. However, the design of authentication and key agreement schemes in WSNs is still quite a challenging problem. In this paper, we analyze a strong authentication scheme with user privacy for WSNs proposed by Kumar et al. in 2013, and point out the scheme can not resist known session key attack, impersonation attack, sensor node capture attack and suffer from forward security problem, anonymity and untraceability problem.
引用
收藏
页码:425 / 430
页数:6
相关论文
共 50 条
  • [1] A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    Lee, Sang-Gon
    Lee, HoonJae
    ETRI JOURNAL, 2013, 35 (05) : 889 - 899
  • [2] Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
    Lee, Yung-Cheng
    Lai, Hsin-Yu
    Lee, Pei-Ju
    INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY INNOVATION, 2012, 2 (04) : 283 - 292
  • [3] Enhanced User Authentication Scheme for Wireless Sensor Networks
    Park, Hee-Joo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 367 - 374
  • [4] Cryptanalysis of Vaidya et al.'s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
    Li Jiping
    Ding Yaoming
    Xiong Zenggang
    Liu Shouyin
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 619 - 623
  • [5] Cryptanalysis of a Privacy-Preserving and Provable User Authentication Scheme for Wireless Sensor Networks based on Internet of Things Security
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Song, Taeui
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 432 - 437
  • [6] Cryptanalysis of "A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks"
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 312 - 317
  • [7] Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks
    Wei, Fushan
    Ma, Jianfeng
    Jiang, Qi
    Shen, Jian
    Ma, Chuangui
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 62 - 70
  • [8] Cryptanalysis of an Untraceable Temporal-Credential-Based Two-Factor Authentication Scheme Using ECC for Wireless Sensor Networks
    Yang, Shu-Ying
    Xu, Cheng-Bo
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 661 - 665
  • [9] Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network
    Akansha Singh
    Amit K. Awasthi
    Karan Singh
    Wireless Personal Communications, 2017, 94 : 1881 - 1898
  • [10] Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network
    Singh, Akansha
    Awasthi, Amit K.
    Singh, Karan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1881 - 1898