Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks

被引:45
作者
Chang, I-Pin [1 ]
Lee, Tian-Fu [2 ]
Lin, Tsung-Hung [3 ]
Liu, Chuan-Ming [4 ]
机构
[1] Kang Ning Univ, Dept Digital Applicat, Tainan 70970, Taiwan
[2] Tzu Chi Univ, Dept Med Informat, Hualien 97004, Taiwan
[3] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41170, Taiwan
[4] Natl Taipei Univ Technol, Dept Comp Sci & Informat Engn, Taipei 10608, Taiwan
关键词
authentication; key agreement; dynamic identity; wireless sensor networks; password; smartcard; MUTUAL AUTHENTICATION; USER AUTHENTICATION; PROVABLY SECURE; PROTOCOL; SCHEME;
D O I
10.3390/s151229767
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.
引用
收藏
页码:29841 / 29854
页数:14
相关论文
共 21 条
[1]  
Bellare M, 2000, P ADV CRYPT EUR 2000, P122
[2]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[3]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[4]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[5]   A light-weight authentication scheme for wireless sensor networks [J].
Delgado-Mohatar, Oscar ;
Fuster-Sabater, Amparo ;
Sierra, Jose M. .
AD HOC NETWORKS, 2011, 9 (05) :727-735
[6]  
Han K, 2012, AD HOC SENS WIREL NE, V14, P251
[7]  
He DJ, 2010, AD HOC SENS WIREL NE, V10, P361
[8]   Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks [J].
Kim, Jiye ;
Lee, Donghoon ;
Jeon, Woongryul ;
Lee, Youngsook ;
Won, Dongho .
SENSORS, 2014, 14 (04) :6443-6462
[9]   User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks [J].
Lee, Tian-Fu .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) :1404-1413
[10]   Provably secure and efficient authentication techniques for the global mobility network [J].
Lee, Tian-Fu ;
Hwang, Tzonelih .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) :1717-1725