Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks

被引:0
|
作者
Lee, Yung-Cheng [1 ]
Lai, Hsin-Yu [2 ]
Lee, Pei-Ju [3 ]
机构
[1] WuFeng Univ, Dept Secur Technol & Management, Chiayi, Taiwan
[2] WuFeng Univ, Grad Sch OptoMechatron & Mat, Chiayi, Taiwan
[3] Univ Pittsburgh, Sch Informat Sci, 135 N Bellefield, Pittsburgh, PA 15260 USA
关键词
wireless sensor networks; authentication; guessing attack; impersonation attack;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to remedy the flaws. The improved scheme withstands the replay attack and off-line guessing attack and the users can freely update their passwords via public channels.
引用
收藏
页码:283 / 292
页数:10
相关论文
共 50 条
  • [41] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)
  • [42] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chang, Chin-Chen
    Hsueh, Wei-Yuan
    Cheng, Ting-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 447 - 465
  • [43] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chin-Chen Chang
    Wei-Yuan Hsueh
    Ting-Fang Cheng
    Wireless Personal Communications, 2016, 89 : 447 - 465
  • [44] Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks
    Das, Ashok Kumar
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 1 - 9
  • [45] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 229 - 243
  • [46] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [47] Cryptanalysis and improvement of an authentication scheme for IoT
    Kumar, Rahul
    Gupta, Mridul Kumar
    Kumari, Saru
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (1-2) : 73 - 87
  • [49] Cryptanalysis and improvement of an enhanced smart card based remote user authentication scheme
    Xu, C. (cbqysy@gmail.com), 1600, Binary Information Press (10): : 2035 - 2042
  • [50] A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 813 - 832