On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks

被引:22
作者
He, Jun [1 ]
Yang, Zheng [1 ,2 ]
Zhang, Jianxun [1 ]
Liu, Wanping [1 ]
Liu, Chao [1 ]
机构
[1] Chongqing Univ Technol, Sch Comp Sci & Engn, Chongqing, Peoples R China
[2] Univ Helsinki, Dept Comp Sci, Gustaf Hallstromin Katu 2b, Helsinki 00014, Finland
基金
中国国家自然科学基金;
关键词
Cryptanalysis; authenticated key exchange; wireless sensor network; security attack; security model; KEY AGREEMENT SCHEME; USER AUTHENTICATION; PROTOCOL; INTERNET;
D O I
10.1177/1550147718756311
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a recent paper, Chang and Le proposed an efficient smart card-based authenticated key exchange protocol (which is referred to as CL scheme) for heterogeneous ad hoc wireless sensor networks. However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. An improved protocol is proposed to fix this problem.
引用
收藏
页数:11
相关论文
共 25 条
[1]   A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring [J].
Ali, Rifaqat ;
Pal, Arup Kumar ;
Kumari, Saru ;
Karuppiah, Marimuthu ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :200-215
[2]  
[Anonymous], 2004, IACR CRYPTOL EPRINT
[3]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[4]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[5]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[6]   A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Hsueh, Wei-Yuan ;
Cheng, Ting-Fang .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) :447-465
[7]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[8]   A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth [J].
Chen, Yuwen ;
Martinez, Jose-Fernan ;
Castillejo, Pedro ;
Lopez, Lourdes .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
[9]   Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Choi, Younsung ;
Lee, Donghoon ;
Kim, Jiye ;
Jung, Jaewook ;
Nam, Junghyun ;
Won, Dongho .
SENSORS, 2014, 14 (06) :10081-10106
[10]   Provably secure user authentication and key agreement scheme for wireless sensor networks [J].
Das, Ashok Kumar ;
Kumari, Saru ;
Odelu, Vanga ;
Li, Xiong ;
Wu, Fan ;
Huang, Xinyi .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3670-3687