On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

被引:165
作者
Wang, Ding [1 ,2 ]
Wang, Ping [2 ,3 ]
机构
[1] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[2] Natl Engn Res Ctr Software Engn, Beijing 100871, Peoples R China
[3] Peking Univ, Sch Software & Microelect, Beijing 100260, Peoples R China
基金
中国国家自然科学基金;
关键词
Two-factor authentication; Wireless sensor networks; User anonymity; Smart card; Non-tamper resistant; REMOTE USER AUTHENTICATION; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; SECURITY ENHANCEMENT; SMART CARDS; ROAMING SERVICES; EFFICIENT; PROTOCOL; EXCHANGE; CRYPTANALYSIS;
D O I
10.1016/j.comnet.2014.07.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have been devoted to designing schemes with user anonymity by only using lightweight symmetric-key primitives such as hash functions and block ciphers, to the best of our knowledge none has succeeded so far. In this work, we take an initial step to shed light on the rationale underlying this prominent issue. Firstly, we scrutinize two previously-thought sound schemes, namely Fan et al.'s scheme and Xue et al.'s scheme, and demonstrate the major challenges in designing a scheme with user anonymity. Secondly, using these two foremost schemes as case studies and on the basis of the work of Halevi-Krawczyk (1999) [44] and Impagliazzo-Rudich (1989) [43], we put forward a general principle: Public-key techniques are intrinsically indispensable to construct a two-factor authentication scheme that can support user anonymity. Furthermore, we discuss the practical solutions to realize user anonymity. Remarkably, our principle can be applied to two-factor schemes for universal environments besides WSNs, such as the Internet, global mobility networks and mobile clouds. We believe that our work contributes to a better understanding of the inherent complexity in achieving user privacy, and will establish a groundwork for developing more secure and efficient privacy-preserving two-factor authentication schemes. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:41 / 57
页数:17
相关论文
共 115 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
[Anonymous], 2012581 CRYPT EPRINT
[3]  
[Anonymous], 2010, 2010 Proceedings IEEE INFOCOM
[4]  
[Anonymous], INT J COMMUN SYST
[5]  
[Anonymous], SMART CARD SECURITY
[6]  
[Anonymous], 2009631 CRYPT EPRINT
[7]  
Backes M, 2005, LECT NOTES COMPUT SC, V3679, P178
[8]  
Bao F., 2001, PROINTERNATIONAL C I, P202
[9]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[10]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615