Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2015

01-11-2015

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Authors: Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian

Published in: Peer-to-Peer Networking and Applications | Issue 6/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

User authentication with unlinkability is one of the corner stone services for many security and privacy services which are required to secure communications in wireless sensor networks (WSNs). Recently, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs, and claimed that their scheme achieves identity and password protection, and the resiliency of stolen smart card attacks. However, we observe that Xue et al.’s scheme is subject to identity guessing attack, tracking attack, privileged insider attack and weak stolen smart card attack. In order to fix the drawbacks, we propose an enhanced authentication scheme with unlinkability. Additionally, the proposed scheme further cuts the computational cost. Therefore, the proposed scheme not only remedies its security flaws but also improves its performance. It is more suitable for practical applications of WSNs than Xue et al.’s scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef
2.
go back to reference He S, Chen J, Cheng P, Gu J, He T, Sun Y (2012) Maintaining quality of sensing with actors in wireless sensor network. IEEE Trans Parallel Distrib Syst 23(9):1657–1667CrossRef He S, Chen J, Cheng P, Gu J, He T, Sun Y (2012) Maintaining quality of sensing with actors in wireless sensor network. IEEE Trans Parallel Distrib Syst 23(9):1657–1667CrossRef
3.
go back to reference He S, Chen J, Yau D, Sun Y (2012) Cross-layer optimization of correlated data gathering in wireless sensor networks. IEEE Trans Mob Comput 11(11):1678–1691CrossRef He S, Chen J, Yau D, Sun Y (2012) Cross-layer optimization of correlated data gathering in wireless sensor networks. IEEE Trans Mob Comput 11(11):1678–1691CrossRef
4.
go back to reference He S, Chen J, Li X, Shen X, Sun Y (2012) Leveraging prediction to improve the coverage of wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(4):701–712CrossRef He S, Chen J, Li X, Shen X, Sun Y (2012) Leveraging prediction to improve the coverage of wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(4):701–712CrossRef
5.
go back to reference Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst. doi:10.1109/TPDS.2013.124 Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst. doi:10.​1109/​TPDS.​2013.​124
6.
go back to reference Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22–32CrossRef Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22–32CrossRef
7.
go back to reference Gao Z, Zhu H, Li S, Du S, Li X (2012) Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wirel Commun 19(6):106–112CrossRef Gao Z, Zhu H, Li S, Du S, Li X (2012) Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wirel Commun 19(6):106–112CrossRef
9.
go back to reference Vaidya B, Rodrigues J, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int J Commun Syst 23(9–10):1201–1222CrossRef Vaidya B, Rodrigues J, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int J Commun Syst 23(9–10):1201–1222CrossRef
10.
go back to reference Das M (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef Das M (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef
12.
go back to reference Khan M, Alghathbar K (2010) Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3):2450–2459CrossRef Khan M, Alghathbar K (2010) Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3):2450–2459CrossRef
13.
go back to reference Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712CrossRef Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712CrossRef
14.
go back to reference Yeh H-L, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779CrossRef Yeh H-L, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779CrossRef
15.
go back to reference Kumar P et al (2011) RUASN: a robust user authentication framework for wireless sensor networks. Sensors 11(5):5020–5046CrossRef Kumar P et al (2011) RUASN: a robust user authentication framework for wireless sensor networks. Sensors 11(5):5020–5046CrossRef
16.
go back to reference Jiang Q, Ma Z, Ma J, Li G (2012) Security enhancement of robust user authentication framework for wireless sensor networks. China Commun 9(10):103–111 Jiang Q, Ma Z, Ma J, Li G (2012) Security enhancement of robust user authentication framework for wireless sensor networks. China Commun 9(10):103–111
17.
go back to reference Vaidya B, Makrakis D, Mouftah H (2012) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw. doi:10.1002/sec.517 Vaidya B, Makrakis D, Mouftah H (2012) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw. doi:10.​1002/​sec.​517
18.
go back to reference Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656CrossRef Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656CrossRef
19.
go back to reference Yoo S G, Park K Y, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distrib Sens Netw, Article ID 382810, 11 pages Yoo S G, Park K Y, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distrib Sens Netw, Article ID 382810, 11 pages
20.
go back to reference Sun D, Li J, Feng Z, Cao Z, Xu G (2012) On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers Ubiquit Comput. doi:10.1007/s00779-012-0540-3 Sun D, Li J, Feng Z, Cao Z, Xu G (2012) On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers Ubiquit Comput. doi:10.​1007/​s00779-012-0540-3
21.
go back to reference Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef
22.
go back to reference Kocher P, Jaffe J, Jun B (1999) Differential power analysis, In proceedings of 19th international advances in cryptology conference CRYPTO, Santa Barbara, CA, USA, pp 388–397 Kocher P, Jaffe J, Jun B (1999) Differential power analysis, In proceedings of 19th international advances in cryptology conference CRYPTO, Santa Barbara, CA, USA, pp 388–397
23.
go back to reference Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef
24.
go back to reference Jiang Q, Ma J, Li G et al (2013) An enhanced authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491CrossRef Jiang Q, Ma J, Li G et al (2013) An enhanced authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491CrossRef
25.
go back to reference Wang Y (2012) Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Gritzalis D, Furnell S, Theoharidou M (eds) SEC 2012, IFIP AICT, vol 376., pp 489–500 Wang Y (2012) Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Gritzalis D, Furnell S, Theoharidou M (eds) SEC 2012, IFIP AICT, vol 376., pp 489–500
26.
go back to reference Wu S, Zhu Y, Pu Q (2012) Robust smart-cards-based user authentication scheme with user anonymity. Secur Commun Netw 5(2):236–248CrossRef Wu S, Zhu Y, Pu Q (2012) Robust smart-cards-based user authentication scheme with user anonymity. Secur Commun Netw 5(2):236–248CrossRef
27.
go back to reference He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423–1429CrossRef He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423–1429CrossRef
28.
go back to reference He D, Chen J, Zhang R (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989–1995CrossRef He D, Chen J, Zhang R (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989–1995CrossRef
29.
go back to reference Li X, Qiu W, Zheng D, Chen K, Li J (2010) Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 57(2):793–800CrossRef Li X, Qiu W, Zheng D, Chen K, Li J (2010) Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 57(2):793–800CrossRef
30.
go back to reference Ma CG, Wang D, Zhao SD (2012) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst. doi:10.1002/dac.2468 Ma CG, Wang D, Zhao SD (2012) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst. doi:10.​1002/​dac.​2468
31.
go back to reference Yang G, Wong D, Wang H, Deng X (2008) Two-factor mutual authentication based on smart cards and passwords. J Comput Syst Sci 74(7):1160–1172MathSciNetCrossRefMATH Yang G, Wong D, Wang H, Deng X (2008) Two-factor mutual authentication based on smart cards and passwords. J Comput Syst Sci 74(7):1160–1172MathSciNetCrossRefMATH
32.
go back to reference Juang W, Chen S, Liaw H (2008) Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 55(6):2551–2556CrossRef Juang W, Chen S, Liaw H (2008) Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 55(6):2551–2556CrossRef
33.
go back to reference Lee CC, Li CT, Chang RX (2012) A simple and efficient authentication scheme for mobile satellite communication systems. Int J Satell Commun Netw 30(1):29–38CrossRef Lee CC, Li CT, Chang RX (2012) A simple and efficient authentication scheme for mobile satellite communication systems. Int J Satell Commun Netw 30(1):29–38CrossRef
34.
go back to reference Wu S, Pu Q, Kang F (2013) Practical authentication scheme for SIP. Peer-to-Peer Netw Appl 6(1):61–74CrossRef Wu S, Pu Q, Kang F (2013) Practical authentication scheme for SIP. Peer-to-Peer Netw Appl 6(1):61–74CrossRef
35.
go back to reference Pu Q, Wang J, Wu S, Fu J (2013) Secure verifier-based three-party password-authenticated key exchange. Peer-to-Peer Netw Appl 6(1):15–25CrossRef Pu Q, Wang J, Wu S, Fu J (2013) Secure verifier-based three-party password-authenticated key exchange. Peer-to-Peer Netw Appl 6(1):15–25CrossRef
Metadata
Title
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Authors
Qi Jiang
Jianfeng Ma
Xiang Lu
Youliang Tian
Publication date
01-11-2015
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2015
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-014-0285-z

Other articles of this Issue 6/2015

Peer-to-Peer Networking and Applications 6/2015 Go to the issue

Premium Partner