An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

被引:38
作者
Jung, Jaewook [1 ]
Kim, Jiye [1 ]
Choi, Younsung [2 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, 2066 Seoburo, Suwon 440746, Gyeonggido, South Korea
[2] Howon Univ, Dept Cyber Secur, 64 Howon Univ 3 Gil, Gunsan Si 54058, Jeonrabuk Do, South Korea
基金
新加坡国家研究基金会;
关键词
wireless sensor networks; mutual authentication; key agreement; BAN-logic; smart card; MUTUAL AUTHENTICATION; PASSWORD AUTHENTICATION; SECURITY; PROTOCOL; IMPROVEMENTS; FRAMEWORK; EFFICIENT; INTERNET;
D O I
10.3390/s16081299
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
引用
收藏
页数:30
相关论文
共 50 条
  • [31] An efficient anonymous user authentication and key agreement protocol for wireless sensor networks
    Kumar, Devender
    Grover, Harmanpreet Singh
    Kaur, Damandeep
    Verma, Adarsh
    Saini, Khushil Kumar
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (05)
  • [32] An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks
    Chen, Ying
    Ge, Yangming
    Wang, Yerong
    Zeng, Zhuang
    IEEE ACCESS, 2019, 7 : 85440 - 85451
  • [33] A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Arshad, Hamed
    Khan, Muhammad Khurram
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 63 : 56 - 75
  • [34] An enhanced anonymous authentication protocol for wireless sensor networks
    Li, Jiping
    Yu, Tong
    Wu, Yunyun
    Kong, Xia
    Liu, Shouyin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 35 (03) : 136 - 149
  • [35] A Secure Temporal-Credential-based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks
    He, Debiao
    Kumar, Neeraj
    Chilamkurti, Naveen
    2013 INTERNATIONAL SYMPOSIUM ON WIRELESS AND PERVASIVE COMPUTING (ISWPC), 2013,
  • [36] An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Shen, Jian
    Choo, Kim-Kwang Raymond
    Wazid, Mohammad
    Das, Ashok Kumar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 89 : 72 - 85
  • [37] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Kumari, Saru
    Wu, Fan
    Chaudhry, Shehzad Ashraf
    Niranchana, R.
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03) : 1046 - 1062
  • [38] A user authentication and key agreement scheme for heterogeneous wireless sensor networks
    Yan L.-L.
    Chang Y.
    Zhang S.-B.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2017, 46 (01): : 55 - 60
  • [39] A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    Xue, Kaiping
    Ma, Changsha
    Hong, Peilin
    Ding, Rong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 316 - 323
  • [40] SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
    Bhawna Narwal
    Amar Kumar Mohapatra
    Arabian Journal for Science and Engineering, 2021, 46 : 9197 - 9219