Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2015

01.11.2015

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

verfasst von: Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

User authentication with unlinkability is one of the corner stone services for many security and privacy services which are required to secure communications in wireless sensor networks (WSNs). Recently, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs, and claimed that their scheme achieves identity and password protection, and the resiliency of stolen smart card attacks. However, we observe that Xue et al.’s scheme is subject to identity guessing attack, tracking attack, privileged insider attack and weak stolen smart card attack. In order to fix the drawbacks, we propose an enhanced authentication scheme with unlinkability. Additionally, the proposed scheme further cuts the computational cost. Therefore, the proposed scheme not only remedies its security flaws but also improves its performance. It is more suitable for practical applications of WSNs than Xue et al.’s scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef
2.
Zurück zum Zitat He S, Chen J, Cheng P, Gu J, He T, Sun Y (2012) Maintaining quality of sensing with actors in wireless sensor network. IEEE Trans Parallel Distrib Syst 23(9):1657–1667CrossRef He S, Chen J, Cheng P, Gu J, He T, Sun Y (2012) Maintaining quality of sensing with actors in wireless sensor network. IEEE Trans Parallel Distrib Syst 23(9):1657–1667CrossRef
3.
Zurück zum Zitat He S, Chen J, Yau D, Sun Y (2012) Cross-layer optimization of correlated data gathering in wireless sensor networks. IEEE Trans Mob Comput 11(11):1678–1691CrossRef He S, Chen J, Yau D, Sun Y (2012) Cross-layer optimization of correlated data gathering in wireless sensor networks. IEEE Trans Mob Comput 11(11):1678–1691CrossRef
4.
Zurück zum Zitat He S, Chen J, Li X, Shen X, Sun Y (2012) Leveraging prediction to improve the coverage of wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(4):701–712CrossRef He S, Chen J, Li X, Shen X, Sun Y (2012) Leveraging prediction to improve the coverage of wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(4):701–712CrossRef
5.
Zurück zum Zitat Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst. doi:10.1109/TPDS.2013.124 Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst. doi:10.​1109/​TPDS.​2013.​124
6.
Zurück zum Zitat Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22–32CrossRef Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22–32CrossRef
7.
Zurück zum Zitat Gao Z, Zhu H, Li S, Du S, Li X (2012) Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wirel Commun 19(6):106–112CrossRef Gao Z, Zhu H, Li S, Du S, Li X (2012) Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wirel Commun 19(6):106–112CrossRef
9.
Zurück zum Zitat Vaidya B, Rodrigues J, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int J Commun Syst 23(9–10):1201–1222CrossRef Vaidya B, Rodrigues J, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int J Commun Syst 23(9–10):1201–1222CrossRef
10.
Zurück zum Zitat Das M (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef Das M (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef
12.
Zurück zum Zitat Khan M, Alghathbar K (2010) Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3):2450–2459CrossRef Khan M, Alghathbar K (2010) Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3):2450–2459CrossRef
13.
Zurück zum Zitat Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712CrossRef Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712CrossRef
14.
Zurück zum Zitat Yeh H-L, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779CrossRef Yeh H-L, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779CrossRef
15.
Zurück zum Zitat Kumar P et al (2011) RUASN: a robust user authentication framework for wireless sensor networks. Sensors 11(5):5020–5046CrossRef Kumar P et al (2011) RUASN: a robust user authentication framework for wireless sensor networks. Sensors 11(5):5020–5046CrossRef
16.
Zurück zum Zitat Jiang Q, Ma Z, Ma J, Li G (2012) Security enhancement of robust user authentication framework for wireless sensor networks. China Commun 9(10):103–111 Jiang Q, Ma Z, Ma J, Li G (2012) Security enhancement of robust user authentication framework for wireless sensor networks. China Commun 9(10):103–111
17.
Zurück zum Zitat Vaidya B, Makrakis D, Mouftah H (2012) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw. doi:10.1002/sec.517 Vaidya B, Makrakis D, Mouftah H (2012) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw. doi:10.​1002/​sec.​517
18.
Zurück zum Zitat Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656CrossRef Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656CrossRef
19.
Zurück zum Zitat Yoo S G, Park K Y, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distrib Sens Netw, Article ID 382810, 11 pages Yoo S G, Park K Y, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distrib Sens Netw, Article ID 382810, 11 pages
20.
Zurück zum Zitat Sun D, Li J, Feng Z, Cao Z, Xu G (2012) On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers Ubiquit Comput. doi:10.1007/s00779-012-0540-3 Sun D, Li J, Feng Z, Cao Z, Xu G (2012) On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers Ubiquit Comput. doi:10.​1007/​s00779-012-0540-3
21.
Zurück zum Zitat Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef
22.
Zurück zum Zitat Kocher P, Jaffe J, Jun B (1999) Differential power analysis, In proceedings of 19th international advances in cryptology conference CRYPTO, Santa Barbara, CA, USA, pp 388–397 Kocher P, Jaffe J, Jun B (1999) Differential power analysis, In proceedings of 19th international advances in cryptology conference CRYPTO, Santa Barbara, CA, USA, pp 388–397
23.
Zurück zum Zitat Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef
24.
Zurück zum Zitat Jiang Q, Ma J, Li G et al (2013) An enhanced authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491CrossRef Jiang Q, Ma J, Li G et al (2013) An enhanced authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491CrossRef
25.
Zurück zum Zitat Wang Y (2012) Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Gritzalis D, Furnell S, Theoharidou M (eds) SEC 2012, IFIP AICT, vol 376., pp 489–500 Wang Y (2012) Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Gritzalis D, Furnell S, Theoharidou M (eds) SEC 2012, IFIP AICT, vol 376., pp 489–500
26.
Zurück zum Zitat Wu S, Zhu Y, Pu Q (2012) Robust smart-cards-based user authentication scheme with user anonymity. Secur Commun Netw 5(2):236–248CrossRef Wu S, Zhu Y, Pu Q (2012) Robust smart-cards-based user authentication scheme with user anonymity. Secur Commun Netw 5(2):236–248CrossRef
27.
Zurück zum Zitat He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423–1429CrossRef He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423–1429CrossRef
28.
Zurück zum Zitat He D, Chen J, Zhang R (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989–1995CrossRef He D, Chen J, Zhang R (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989–1995CrossRef
29.
Zurück zum Zitat Li X, Qiu W, Zheng D, Chen K, Li J (2010) Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 57(2):793–800CrossRef Li X, Qiu W, Zheng D, Chen K, Li J (2010) Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 57(2):793–800CrossRef
30.
Zurück zum Zitat Ma CG, Wang D, Zhao SD (2012) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst. doi:10.1002/dac.2468 Ma CG, Wang D, Zhao SD (2012) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst. doi:10.​1002/​dac.​2468
31.
Zurück zum Zitat Yang G, Wong D, Wang H, Deng X (2008) Two-factor mutual authentication based on smart cards and passwords. J Comput Syst Sci 74(7):1160–1172MathSciNetCrossRefMATH Yang G, Wong D, Wang H, Deng X (2008) Two-factor mutual authentication based on smart cards and passwords. J Comput Syst Sci 74(7):1160–1172MathSciNetCrossRefMATH
32.
Zurück zum Zitat Juang W, Chen S, Liaw H (2008) Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 55(6):2551–2556CrossRef Juang W, Chen S, Liaw H (2008) Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 55(6):2551–2556CrossRef
33.
Zurück zum Zitat Lee CC, Li CT, Chang RX (2012) A simple and efficient authentication scheme for mobile satellite communication systems. Int J Satell Commun Netw 30(1):29–38CrossRef Lee CC, Li CT, Chang RX (2012) A simple and efficient authentication scheme for mobile satellite communication systems. Int J Satell Commun Netw 30(1):29–38CrossRef
34.
Zurück zum Zitat Wu S, Pu Q, Kang F (2013) Practical authentication scheme for SIP. Peer-to-Peer Netw Appl 6(1):61–74CrossRef Wu S, Pu Q, Kang F (2013) Practical authentication scheme for SIP. Peer-to-Peer Netw Appl 6(1):61–74CrossRef
35.
Zurück zum Zitat Pu Q, Wang J, Wu S, Fu J (2013) Secure verifier-based three-party password-authenticated key exchange. Peer-to-Peer Netw Appl 6(1):15–25CrossRef Pu Q, Wang J, Wu S, Fu J (2013) Secure verifier-based three-party password-authenticated key exchange. Peer-to-Peer Netw Appl 6(1):15–25CrossRef
Metadaten
Titel
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
verfasst von
Qi Jiang
Jianfeng Ma
Xiang Lu
Youliang Tian
Publikationsdatum
01.11.2015
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2015
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-014-0285-z

Weitere Artikel der Ausgabe 6/2015

Peer-to-Peer Networking and Applications 6/2015 Zur Ausgabe

Premium Partner