Cryptanalysis of a strong authentication scheme with user privacy for wireless sensor networks

被引:0
|
作者
Xu, Chengbo [1 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan 250022, Shandong, Peoples R China
来源
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON SENSORS, MECHATRONICS AND AUTOMATION (ICSMA 2016) | 2016年 / 136卷
关键词
authentication; password; smart card; session key agreement; wireless sensor netwoks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication and key agreement scheme is an important mechanism for legal users to access the services of wireless sensor network. However, the design of authentication and key agreement schemes in WSNs is still quite a challenging problem. In this paper, we analyze a strong authentication scheme with user privacy for WSNs proposed by Kumar et al. in 2013, and point out the scheme can not resist known session key attack, impersonation attack, sensor node capture attack and suffer from forward security problem, anonymity and untraceability problem.
引用
收藏
页码:425 / 430
页数:6
相关论文
共 50 条
  • [41] Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks
    Kumar, Manoj
    Gupta, Mridul Kumar
    Kumari, Saru
    CONTEMPORARY COMPUTING, 2011, 168 : 524 - +
  • [42] Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks
    Wei, Li
    Yao, Yongtao
    Ding, Zhijun
    Pu, Qiong
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 17 (3-4) : 313 - 339
  • [43] An Enhanced and Secure Biometric Based User Authentication Scheme in Wireless Sensor Networks Using Smart Cards
    Subhasish Banerjee
    Chukhu Chunka
    Srijon Sen
    Rajat Subhra Goswami
    Wireless Personal Communications, 2019, 107 : 243 - 270
  • [44] Efficient user authentication and key agreement in wireless sensor networks
    Juang, Wen-Shenq
    INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 15 - 29
  • [45] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Sun, Da-Zhi
    Li, Jian-Xin
    Feng, Zhi-Yong
    Cao, Zhen-Fu
    Xu, Guang-Quan
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 895 - 905
  • [46] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    Peer-to-Peer Networking and Applications, 2015, 8 : 1070 - 1081
  • [47] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Da-Zhi Sun
    Jian-Xin Li
    Zhi-Yong Feng
    Zhen-Fu Cao
    Guang-Quan Xu
    Personal and Ubiquitous Computing, 2013, 17 : 895 - 905
  • [48] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Jiang, Qi
    Ma, Jianfeng
    Lu, Xiang
    Tian, Youliang
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1070 - 1081
  • [49] Advanced password based authentication scheme for wireless sensor networks
    Kalra, Sheetal
    Sood, Sandeep K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 20 : 37 - 46
  • [50] Cryptanalysis of a Sensor Smart Card Based Password Authentication Scheme with User Anonymity
    Cao, Tianjie
    Huang, Shi
    SENSOR LETTERS, 2013, 11 (11) : 2149 - 2151