An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

被引:38
|
作者
Jung, Jaewook [1 ]
Kim, Jiye [1 ]
Choi, Younsung [2 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, 2066 Seoburo, Suwon 440746, Gyeonggido, South Korea
[2] Howon Univ, Dept Cyber Secur, 64 Howon Univ 3 Gil, Gunsan Si 54058, Jeonrabuk Do, South Korea
基金
新加坡国家研究基金会;
关键词
wireless sensor networks; mutual authentication; key agreement; BAN-logic; smart card; MUTUAL AUTHENTICATION; PASSWORD AUTHENTICATION; SECURITY; PROTOCOL; IMPROVEMENTS; FRAMEWORK; EFFICIENT; INTERNET;
D O I
10.3390/s16081299
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
引用
收藏
页数:30
相关论文
共 50 条
  • [1] An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
    Tyagi, Pooja
    Kumari, Saru
    Alzahrani, Bander A.
    Gupta, Anshay
    Yang, Ming-Hour
    SENSORS, 2022, 22 (22)
  • [2] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)
  • [3] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [4] Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
    Park, YoHan
    Park, YoungHo
    SENSORS, 2016, 16 (12)
  • [5] Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
    Jung, Jaewook
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    SENSORS, 2017, 17 (03)
  • [6] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chang, Chin-Chen
    Hsueh, Wei-Yuan
    Cheng, Ting-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 447 - 465
  • [7] A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
    Ali, Rifaqat
    Pal, Arup Kumar
    Kumari, Saru
    Karuppiah, Marimuthu
    Conti, Mauro
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 200 - 215
  • [8] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chin-Chen Chang
    Wei-Yuan Hsueh
    Ting-Fang Cheng
    Wireless Personal Communications, 2016, 89 : 447 - 465
  • [9] AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks
    Malik, Monica
    Gandhi, Khushi
    Narwal, Bhawna
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [10] An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN
    Alotaibi, Majid
    IEEE ACCESS, 2018, 6 : 70072 - 70087