Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

被引:68
作者
Kim, Jiye [1 ]
Lee, Donghoon [1 ]
Jeon, Woongryul [2 ]
Lee, Youngsook [3 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Coll Informat & Commun Engn, Suwon 440746, Gyeonggi Do, South Korea
[2] Gwangju Univ, Dept Cyber Secur & Police, Gwangju Si 503703, South Korea
[3] Howon Univ, Dept Cyber Invest Police, Gunsan Si 573718, Jeonrabuk Do, South Korea
来源
SENSORS | 2014年 / 14卷 / 04期
关键词
wireless sensor networks (WSNs); mutual authentication; key agreement; two-factor authentication; passwords; smart cards; USER AUTHENTICATION; SCHEME;
D O I
10.3390/s140406443
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.
引用
收藏
页码:6443 / 6462
页数:20
相关论文
共 16 条
[1]  
[Anonymous], 2 FACTOR MUTUAL AUTH
[2]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[3]   A dynamic password-based user authentication scheme for hierarchical wireless sensor networks [J].
Das, Ashok Kumar ;
Sharma, Pranay ;
Chatterjee, Santanu ;
Sing, Jamuna Kanta .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) :1646-1656
[4]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[5]  
He DJ, 2010, AD HOC SENS WIREL NE, V10, P361
[6]   Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks' [J].
Khan, Muhammad Khurram ;
Alghathbar, Khaled .
SENSORS, 2010, 10 (03) :2450-2459
[7]   An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks [J].
Li, Chun-Ta ;
Weng, Chi-Yao ;
Lee, Cheng-Chi .
SENSORS, 2013, 13 (08) :9589-9603
[8]  
NYANG DH, IMPROVEMENT DASS 2 F
[9]  
Tseng H.R., 2007, P GLOB TEL C GLOBECO
[10]   An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks [J].
Turkanovic, M. ;
Holbl, M. .
ELEKTRONIKA IR ELEKTROTECHNIKA, 2013, 19 (06) :109-116