TWO ATTACKS ON A TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS

被引:35
作者
Lee, Cheng-Chi [1 ,2 ]
Li, Chun-Ta [3 ]
Chen, Shun-Der [1 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, N510 Jhongjheng Rd, Taipei 24205, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
[3] Tainan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
关键词
Authentication; sensor networks; wireless security; hash function;
D O I
10.1142/S0129626411000047
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Recently, a secure two-factor user authentication scheme for wireless sensor networks (WSN) was proposed by Das. The proposed scheme can resist many logged in users with the same login identity, stolen-verifier, guessing, impersonation and replay threats. In this paper we study the two-factor user authentication scheme for WSN and find that the scheme is insecure against the masquerade attacks. With our masquerade attacks, an attacker can masquerade as any legal user to login the gateway node without knowing the user's password or can masquerade as a gateway node to communicate with the legal user at anytime.
引用
收藏
页码:21 / 26
页数:6
相关论文
共 12 条
[1]  
Das A. K., 2008, INT J NETWORK SECURI, V6, P134
[2]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[3]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]  
Dressler F., 2008, INT J NETWORK SECURI, V7, P61
[6]   Security enhancement on a new authentication scheme with anonymity for wireless environments [J].
Lee, Cheng-Chi ;
Hwang, Min-Shiang ;
Liao, I-En .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2006, 53 (05) :1683-1687
[7]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[8]  
Wang Liang-Min, 2008, J IJ NETWORK SECURIT, V7, P261
[9]  
Watro R, 2004, P 2 ACM WORKSH SEC A, P59, DOI DOI 10.1145/1029102.1029113
[10]  
Wong KHM, 2006, IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, P244