Advanced password based authentication scheme for wireless sensor networks

被引:22
作者
Kalra, Sheetal [1 ]
Sood, Sandeep K. [2 ]
机构
[1] GNDU, Dept Comp Sci & Engn, Jalandhar, India
[2] GNDU, Dept Comp Sci & Engn, Gurdaspur, India
关键词
Authentication; Complex networks; Smart card; Wireless sensor networks;
D O I
10.1016/j.jisa.2014.10.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This era of ubiquitous computing has led to the development of complex communication networks all over the world. Wireless sensors, due to their wide applicability, form a key component of any complex network. But, security is a major challenge in making wireless sensor networks robust. Many remote user authentication schemes have been proposed for authenticating the legitimate users of a wireless sensor network. Most of the recently proposed schemes are vulnerable to one or more security attacks and are inefficient in terms of processing time. In this paper, the scheme proposed by Xue et al. has been reviewed and it has been found that the scheme is vulnerable to impersonation attack, stolen smart card attack, server spoofing attack. This paper proposes a robust and efficient password based authentication scheme which is secure against all well known security attacks. Moreover, the scheme has a low computation and communication cost and does not suffer from time synchronization problem. A formal security analysis has been performed using AVISPA tool to prove the security of the protocol. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:37 / 46
页数:10
相关论文
共 21 条
  • [1] Chao Lv, 2013, J NETW COMPUT APPL, V36, P298
  • [2] A Robust Mutual Authentication Protocol for Wireless Sensor Networks
    Chen, Tien-Ho
    Shih, Wei-Kuan
    [J]. ETRI JOURNAL, 2010, 32 (05) : 704 - 712
  • [3] An authenticated identity-based key establishment and encryption scheme for wireless sensor networks
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    不详
    [J]. J. China Univ. Post Telecom., 2006, 2 (31-38): : 31 - 38
  • [4] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [5] A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks
    He, Daojing
    Chen, Chun
    Ma, Maode
    Chan, Sammy
    Bu, Jiajun
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (04) : 495 - 504
  • [6] He DJ, 2010, AD HOC SENS WIREL NE, V10, P361
  • [7] An analysis of conformance issues in implementations of standardized security protocols
    Izquierdo, Antonio
    Sierra, Jose M.
    Torres, Joaquin
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 246 - 251
  • [8] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    [J]. SENSORS, 2010, 10 (03) : 2450 - 2459
  • [9] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
  • [10] An novel three-party authenticated key exchange protocol using one-time key
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 498 - 503