An enhanced two-factor user authentication in wireless sensor networks

被引:34
作者
Yuan, Jian-Jun [1 ]
机构
[1] Tongji Univ, Key Lab Embedded Syst & Serv Comp, Minist Educ, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Authentication; Biometrics; Smart card; Security; Wireless sensor networks; SECURITY; SCHEME;
D O I
10.1007/s11235-013-9755-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to access data from sensor nodes. Recently, M. L. Das proposed a two-factor user authentication scheme in WSN and claimed that his scheme is secure against different kinds of attack. Later, Khan and Alghathbar (K-A) pointed out that Das' scheme has some security pitfalls and showed several improvements to overcome these weaknesses. However, we demonstrate that in the K-A-scheme, there is no provision of non-repudiation, it is susceptible to the attack due to a lost smart card, and mutual authentication between the user and the GW-node does not attained. Moreover, the GW-node cannot prove that the first message comes from the user. To overcome these security weaknesses of the K-A-scheme, we propose security patches and prove our scheme.
引用
收藏
页码:105 / 113
页数:9
相关论文
共 28 条
[1]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]  
[Anonymous], P WORKSH REAL WORLD
[3]  
Benenson Z., 2004, GI JAHRESTAGUNG, V2, P385
[4]  
Bromme Arslan, 2006, Int. J. Netw. Secur., V2, P52
[5]   Sensor networks: Evolution, opportunities, and challenges [J].
Chong, CY ;
Kumar, SP .
PROCEEDINGS OF THE IEEE, 2003, 91 (08) :1247-1256
[6]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[7]  
Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
[8]   Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu ;
Wang, Xiaomin .
CHAOS SOLITONS & FRACTALS, 2008, 35 (03) :519-524
[9]   Improving the security of 'a flexible biometrics remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) :82-85
[10]   Privacy-preserving and tokenless chaotic revocable face authentication scheme [J].
Khan, Muhammad Khurram ;
Alghathbar, Khaled ;
Zhang, Jiashu .
TELECOMMUNICATION SYSTEMS, 2011, 47 (3-4) :227-234