Security enhanced user authentication scheme for wireless sensor network

被引:1
作者
Jannati, Hoda [1 ]
Falahati, Abolfazl [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, DCCS Lab, Tehran, Iran
关键词
authentication; denial of service attack; man in the middle attack; WSN; wireless sensor network;
D O I
10.1504/IJESDF.2012.049735
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication and privacy are the two imperative security requirements by every wireless networks. Only recently, Vaidya, Rodrigues and Park proposed two low-cost authentication schemes with user privacy for wireless sensor networks (WSNs). However, this paper shows Vaidya et al.'s schemes cannot provide privacy in the presence of an adversary as they claim. Also, Vaidya et al.'s schemes are vulnerable to offline password guessing attack. To overcome these weaknesses, this paper improves their profound authentication schemes. The security of the improved scheme is analysed which reveals that the improved scheme can overcome such weaknesses. The performance of the improved scheme is the same as Vaidya et al.'s schemes with the same simplicity as well as being still suitable for WSNs.
引用
收藏
页码:215 / 228
页数:14
相关论文
共 22 条
  • [1] Benenson Z., 2005, REALIZING ROBUST USE
  • [2] Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    Chang, Chin-Chen
    Lee, Chia-Yin
    Chi, Yen-Chang
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (04) : 611 - 618
  • [3] Chin-Chen Chang, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P902, DOI 10.1109/IIH-MSP.2009.172
  • [4] Sensor networks: Evolution, opportunities, and challenges
    Chong, CY
    Kumar, SP
    [J]. PROCEEDINGS OF THE IEEE, 2003, 91 (08) : 1247 - 1256
  • [5] A dynamic ID-based remote user authentication scheme
    Das, ML
    Saxena, A
    Gulati, VP
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 629 - 631
  • [6] Jiang C., 2007, ADV INTEL SYS RES, P438
  • [7] Ko LC, 2008, 2008 IEEE INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2008), P191
  • [8] Security enhancement on a new authentication scheme with anonymity for wireless environments
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Liao, I-En
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2006, 53 (05) : 1683 - 1687
  • [9] Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) : 292 - 293
  • [10] Cryptanalysis of a modified remote user authentication scheme using smart cards
    Leung, KC
    Cheng, LM
    Fong, AS
    Chan, CK
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) : 1243 - 1245