Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks

被引:0
|
作者
Lee, Yung-Cheng [1 ]
Lai, Hsin-Yu [2 ]
Lee, Pei-Ju [3 ]
机构
[1] WuFeng Univ, Dept Secur Technol & Management, Chiayi, Taiwan
[2] WuFeng Univ, Grad Sch OptoMechatron & Mat, Chiayi, Taiwan
[3] Univ Pittsburgh, Sch Informat Sci, 135 N Bellefield, Pittsburgh, PA 15260 USA
关键词
wireless sensor networks; authentication; guessing attack; impersonation attack;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to remedy the flaws. The improved scheme withstands the replay attack and off-line guessing attack and the users can freely update their passwords via public channels.
引用
收藏
页码:283 / 292
页数:10
相关论文
共 50 条
  • [21] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [22] Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks
    Song, Taeui
    Kang, Dongwoo
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II, 2018, 10961 : 50 - 61
  • [23] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [24] A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks
    Das, Ashok Kumar
    Bruhadeshwar, Bezawada
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 291 - 296
  • [25] Cryptanalysis of a Privacy-Preserving and Provable User Authentication Scheme for Wireless Sensor Networks based on Internet of Things Security
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Song, Taeui
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 432 - 437
  • [26] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    SENSORS, 2010, 10 (03) : 2450 - 2459
  • [27] Cryptanalysis and Improvement of A Mutual User Authentication Scheme for the Internet of Things
    Limbasiya, Trupil
    Karati, Arijit
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 168 - 173
  • [28] A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
    Ashok Kumar Das
    Peer-to-Peer Networking and Applications, 2016, 9 : 223 - 244
  • [30] Cryptanalysis and improvement of a two-factor user authentication scheme for smart home
    Kaur, Damandeep
    Kumar, Devender
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58