An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

被引:108
作者
Li, Chun-Ta [1 ]
Weng, Chi-Yao [2 ]
Lee, Cheng-Chi [3 ,4 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, Tainan 71002, Taiwan
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
[3] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, Taichung 41354, Taiwan
关键词
cryptanalysis; key agreement; mutual authentication; temporal credential; wireless sensor network; 2-FACTOR USER AUTHENTICATION; PASSWORD AUTHENTICATION; SMART CARD; ANONYMITY; PROTOCOL; CRYPTOGRAPHY;
D O I
10.3390/s130809589
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.
引用
收藏
页码:9589 / 9603
页数:15
相关论文
共 27 条
[11]  
Han K, 2012, AD HOC SENS WIREL NE, V14, P251
[12]  
Jie H., 2012, AD HOC SENS WIREL NE, V16, P45
[13]   Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks' [J].
Khan, Muhammad Khurram ;
Alghathbar, Khaled .
SENSORS, 2010, 10 (03) :2450-2459
[14]  
Li C. T., 2013, SENS LETT IN PRESS
[15]   A lack-of-fit test for parametric zero-inflated Poisson models [J].
Li, Chin-Shang .
JOURNAL OF STATISTICAL COMPUTATION AND SIMULATION, 2011, 81 (09) :1081-1098
[16]   A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card [J].
Li, Chun-Ta .
IET INFORMATION SECURITY, 2013, 7 (01) :3-10
[17]   An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity [J].
Li, Chun-Ta ;
Lee, Cheng-Chi ;
Weng, Chi-Yao ;
Fan, Chun-I .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (01) :119-131
[18]   A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS [J].
Li, Chun-Ta .
INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01) :69-76
[19]   A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks [J].
Li, Chun-Ta ;
Hwang, Min-Shiang .
INFORMATION SCIENCES, 2011, 181 (23) :5333-5347
[20]  
Li CT, 2011, INT J INNOV COMPUT I, V7, P4821