An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

被引:108
作者
Li, Chun-Ta [1 ]
Weng, Chi-Yao [2 ]
Lee, Cheng-Chi [3 ,4 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, Tainan 71002, Taiwan
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
[3] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, Taichung 41354, Taiwan
关键词
cryptanalysis; key agreement; mutual authentication; temporal credential; wireless sensor network; 2-FACTOR USER AUTHENTICATION; PASSWORD AUTHENTICATION; SMART CARD; ANONYMITY; PROTOCOL; CRYPTOGRAPHY;
D O I
10.3390/s130809589
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.
引用
收藏
页码:9589 / 9603
页数:15
相关论文
共 27 条
[1]  
[Anonymous], 2012, INT J NETW SECUR
[2]  
[Anonymous], 2013, IJ NETWORK SECURITY
[3]   A cyber-physical approach to secret key generation in smart environments [J].
Barsocchi, Paolo ;
Chessa, Stefano ;
Martinovic, Ivan ;
Oligeri, Gabriele .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2013, 4 (01) :1-16
[4]  
Barsocchi P, 2010, LECT NOTES COMPUT SC, V6439, P73, DOI 10.1007/978-3-642-16917-5_8
[5]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[6]  
Das A.K., 2012, INT J NETW SECUR, V14, P1
[7]   A dynamic password-based user authentication scheme for hierarchical wireless sensor networks [J].
Das, Ashok Kumar ;
Sharma, Pranay ;
Chatterjee, Santanu ;
Sing, Jamuna Kanta .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) :1646-1656
[8]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[9]   A light-weight authentication scheme for wireless sensor networks [J].
Delgado-Mohatar, Oscar ;
Fuster-Sabater, Amparo ;
Sierra, Jose M. .
AD HOC NETWORKS, 2011, 9 (05) :727-735
[10]  
Han K., 2010, AD HOC SENS WIREL NE, V10, P361