An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

被引:38
作者
Jung, Jaewook [1 ]
Kim, Jiye [1 ]
Choi, Younsung [2 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, 2066 Seoburo, Suwon 440746, Gyeonggido, South Korea
[2] Howon Univ, Dept Cyber Secur, 64 Howon Univ 3 Gil, Gunsan Si 54058, Jeonrabuk Do, South Korea
基金
新加坡国家研究基金会;
关键词
wireless sensor networks; mutual authentication; key agreement; BAN-logic; smart card; MUTUAL AUTHENTICATION; PASSWORD AUTHENTICATION; SECURITY; PROTOCOL; IMPROVEMENTS; FRAMEWORK; EFFICIENT; INTERNET;
D O I
10.3390/s16081299
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
引用
收藏
页数:30
相关论文
共 50 条
  • [41] A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT
    Yang, Jen-Ho
    EURASIP JOURNAL ON INFORMATION SECURITY, 2023, 2023 (01)
  • [42] Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem
    Yoon, Eun-Jun
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2011, 19 (03) : 335 - 347
  • [43] A Lightweight User Authentication Scheme for Multi-Gateway Based Wireless Sensor Networks Using Rabin Cryptosystem
    Zhao, Xingwen
    Li, Dexin
    IEEE ACCESS, 2023, 11 : 79874 - 79889
  • [44] Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks
    Wei, Fushan
    Ma, Jianfeng
    Jiang, Qi
    Shen, Jian
    Ma, Chuangui
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 62 - 70
  • [45] Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
    Adavoudi-Jolfaei, AmirHosein
    Ashouri-Talouki, Maede
    Aghili, Seyed Farhad
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) : 43 - 59
  • [46] Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”
    Muhamed Turkanović
    Marko Hölbl
    Wireless Personal Communications, 2014, 77 : 907 - 922
  • [47] A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    He, Debiao
    Kumar, Neeraj
    Chilamkurti, Naveen
    INFORMATION SCIENCES, 2015, 321 : 263 - 277
  • [48] Anonymous three-factor authenticated key agreement for wireless sensor networks
    Lu, Yanrong
    Xu, Guangquan
    Li, Lixiang
    Yang, Yixian
    WIRELESS NETWORKS, 2019, 25 (04) : 1461 - 1475
  • [49] Cryptanalysis of "A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks"
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 312 - 317
  • [50] Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Han, Sangchul
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    PLOS ONE, 2015, 10 (04):