A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks

被引:7
|
作者
Yoo, Sang Guun [1 ]
Lee, Hyukjun [1 ]
Kim, Juho [1 ]
机构
[1] Sogang Univ, Dept Comp Sci & Engn, Seoul 121712, South Korea
关键词
EFFICIENT; PROTOCOL;
D O I
10.1155/2013/543950
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. On the other hand, they also present a usability constraint, in a sense that they do not consider the use case when sensor nodes cannot communicate with gateway node. In this case, data collected by isolated sensor nodes could not be accessed until they recover such communication, which is in many times not recoverable rapidly or forever (e. g., military applications, natural disaster monitoring). Due to all these reasons, this paper proposes a robust user authentication scheme which fixes the security weaknesses of previous solutions and provides wider usability considering the use case when the sensor nodes cannot communicate with the gateway node. Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.
引用
收藏
页数:22
相关论文
共 50 条
  • [11] Improved Two-factor User Authentication in Wireless Sensor Networks
    Vaidya, Binod
    Makrakis, Dimitrios
    Mouftah, Hussein T.
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 600 - 606
  • [12] TWO ATTACKS ON A TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Shun-Der
    PARALLEL PROCESSING LETTERS, 2011, 21 (01) : 21 - 26
  • [13] A DoS-Resilient Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks
    Wang, Fei
    Zhang, Yujun
    Xu, Yongjun
    Wu, Lin
    Diao, Boyu
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 1096 - 1102
  • [14] An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks
    Zhao, Jingying
    Guo, Hai
    Wei, Wei
    COMPUTATIONAL MECHANICS, MATERIALS AND ENGINEERING APPLICATIONS, 2012, 147 : 320 - 323
  • [15] Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 55 - 60
  • [16] A Survey on Two-Factor User Authentication Schemes in Wireless Sensor Networks
    Kaur, Sharanjeet
    Khandnor, P.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1077 - 1081
  • [17] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    SENSORS, 2010, 10 (03) : 2450 - 2459
  • [18] A two-factor security authentication scheme for wireless sensor networks in IoT environments
    Hu, Bin
    Tang, Wen
    Xie, Qi
    NEUROCOMPUTING, 2022, 500 : 741 - 749
  • [19] Secure user authentication scheme for wireless healthcare sensor networks
    Liu, Chia-Hui
    Chung, Yu-Fang
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 250 - 261
  • [20] An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks
    Li, Jiping
    Ding, Yaoming
    Xiong, Zenggang
    Liu, Shouyin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (11): : 5556 - 5573