scispace - formally typeset
Journal ArticleDOI

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

TLDR
The proposed enhanced authentication scheme with unlinkability not only remedies its security flaws but also improves its performance and is more suitable for practical applications of WSNs than Xue et al.
Abstract
User authentication with unlinkability is one of the corner stone services for many security and privacy services which are required to secure communications in wireless sensor networks (WSNs). Recently, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs, and claimed that their scheme achieves identity and password protection, and the resiliency of stolen smart card attacks. However, we observe that Xue et al.’s scheme is subject to identity guessing attack, tracking attack, privileged insider attack and weak stolen smart card attack. In order to fix the drawbacks, we propose an enhanced authentication scheme with unlinkability. Additionally, the proposed scheme further cuts the computational cost. Therefore, the proposed scheme not only remedies its security flaws but also improves its performance. It is more suitable for practical applications of WSNs than Xue et al.’s scheme.

read more

Citations
More filters
Journal ArticleDOI

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

TL;DR: This paper focuses on overcoming the security weaknesses of Turkanovic et?al.'s scheme, by proposing a new and improved UAKAS which enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKas.
Journal ArticleDOI

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks

TL;DR: The design of a new secure lightweight three-factor remote user authentication scheme for HIoTNs, called the user authenticated key management protocol (UAKMP), which is comparable in computation and communication costs as compared to other existing schemes.
Journal ArticleDOI

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

TL;DR: A three-factor anonymous authentication scheme for WSNs in Internet of Things environments, where fuzzy commitment scheme is adopted to handle the user's biometric information and keeps computational efficiency, and also achieves more security and functional features.
Journal ArticleDOI

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks

TL;DR: This work presents a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry and presents a comprehensive heuristic security analysis to show that the protocol is secure against all the possible attacks and provides the desired security features.
Journal ArticleDOI

A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

TL;DR: This paper demonstrates that the existing solutions for anonymous user authentication in WSN are impractical, and proposes a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc.
References
More filters
Journal ArticleDOI

Wireless sensor networks: a survey

TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI

Examining smart-card security under the threat of power analysis attacks

TL;DR: In this paper, the authors examined the noise characteristics of the power signals and developed an approach to model the signal-to-noise ratio (SNR) using a multiple-bit attack.
Journal ArticleDOI

Two-factor user authentication in wireless sensor networks

TL;DR: This letter presents a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
Journal ArticleDOI

Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

TL;DR: It is shown that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications, and improvements and security patches are proposed that attempt to fix the susceptibilities of his scheme.
Related Papers (5)