A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks

被引:7
|
作者
Yoo, Sang Guun [1 ]
Lee, Hyukjun [1 ]
Kim, Juho [1 ]
机构
[1] Sogang Univ, Dept Comp Sci & Engn, Seoul 121712, South Korea
关键词
EFFICIENT; PROTOCOL;
D O I
10.1155/2013/543950
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. On the other hand, they also present a usability constraint, in a sense that they do not consider the use case when sensor nodes cannot communicate with gateway node. In this case, data collected by isolated sensor nodes could not be accessed until they recover such communication, which is in many times not recoverable rapidly or forever (e. g., military applications, natural disaster monitoring). Due to all these reasons, this paper proposes a robust user authentication scheme which fixes the security weaknesses of previous solutions and provides wider usability considering the use case when the sensor nodes cannot communicate with the gateway node. Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
    He, Daojing
    Gao, Yi
    Chan, Sammy
    Chen, Chun
    Bu, Jiajun
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (04) : 361 - 371
  • [2] A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Li, Chun-Ta
    Lee, Cheng-Chi
    Wang, Lian-Jun
    Liu, Chen-Ju
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (08): : 4821 - 4831
  • [3] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [4] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Jiang, Qi
    Ma, Jianfeng
    Lu, Xiang
    Tian, Youliang
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1070 - 1081
  • [5] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    Peer-to-Peer Networking and Applications, 2015, 8 : 1070 - 1081
  • [6] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Sun, Da-Zhi
    Li, Jian-Xin
    Feng, Zhi-Yong
    Cao, Zhen-Fu
    Xu, Guang-Quan
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 895 - 905
  • [7] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Da-Zhi Sun
    Jian-Xin Li
    Zhi-Yong Feng
    Zhen-Fu Cao
    Guang-Quan Xu
    Personal and Ubiquitous Computing, 2013, 17 : 895 - 905
  • [8] An enhanced two-factor user authentication in wireless sensor networks
    Yuan, Jian-Jun
    TELECOMMUNICATION SYSTEMS, 2014, 55 (01) : 105 - 113
  • [9] An enhanced two-factor user authentication in wireless sensor networks
    Jian-Jun Yuan
    Telecommunication Systems, 2014, 55 : 105 - 113
  • [10] Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks
    Wei, Fushan
    Ma, Jianfeng
    Jiang, Qi
    Shen, Jian
    Ma, Chuangui
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 62 - 70