Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

被引:165
作者
Choi, Younsung [1 ]
Lee, Donghoon [1 ]
Kim, Jiye [1 ]
Jung, Jaewook [1 ]
Nam, Junghyun [2 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Coll Informat & Commun Engn, Suwonsi 440746, Gyeonggido, South Korea
[2] Konkuk Univ, Dept Comp Engn, Chungju 380701, Chungcheongbukd, South Korea
基金
新加坡国家研究基金会;
关键词
authentication protocol; elliptic curves cryptography; wireless sensor network; SCHEME; ATTACK; ANONYMITY;
D O I
10.3390/s140610081
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
引用
收藏
页码:10081 / 10106
页数:26
相关论文
共 36 条
[1]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]  
[Anonymous], SURVEY SECURITY WIRE
[3]  
[Anonymous], 2008, INT J NETW SECUR
[4]  
[Anonymous], P 2010 2 INT C COMP
[5]  
[Anonymous], WEAKNESS SECURED AUT
[6]  
[Anonymous], GLOB J COMPUT SCI TE
[7]  
[Anonymous], INT J NETWORK SECURI
[8]   Wireless sensor network denial of sleep attack [J].
Brownfield, M ;
Gupta, Y ;
Davis, N .
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, :356-364
[9]  
Buttyan Levente, 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), P419, DOI 10.1109/PERCOMW.2010.5470633
[10]   Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks [J].
Cao, Xuefei ;
Zeng, Xingwen ;
Kou, Weidong ;
Hu, Liangbing .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (07) :3508-3517