Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2023

17-10-2022

Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem

Authors: Gaurav Tyagi, Rahul Kumar

Published in: Peer-to-Peer Networking and Applications | Issue 1/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To formulate a secure and efficient user authentication scheme for wireless sensor networks(WSNs) is a complicated task, because sensors are placed in unattended locations and have limited computation, storage and communication capabilities. Till date, several user authentication and key agreement schemes for WSNs have been introduced by various researchers. Not long ago, Vorugunti et al. suggested a multi-factor user authentication scheme for WSNs and asserted that their scheme withstands against all known attacks. Although, we find out that their scheme notwithstanding against session specific information leakage attack and session key exposer by gateway node. Moreover, it lacks of user anonymity, forward secrecy and multi-factor security. To eliminate these shortcomings, we suggest an improved user authentication scheme and its security is verified by formal analysis using Burrows-Abadi-Needham(BAN) logic and informal analysis. In comparison with six recently proposed schemes, the proposed scheme attains a fine balance among efficiency and security, and it is more appropriate for practical environments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef
2.
go back to reference Wang D, Wang P (2014b) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1–15 Wang D, Wang P (2014b) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1–15
3.
go back to reference Das AK (2016) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer Peer Netw Appl 9(1):223–244CrossRef Das AK (2016) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer Peer Netw Appl 9(1):223–244CrossRef
4.
go back to reference He J, Yang Z, Zhang J, Liu W, Liu C (2018) On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. Int J Distrib Sens N 14(1):1550147718756311 He J, Yang Z, Zhang J, Liu W, Liu C (2018) On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. Int J Distrib Sens N 14(1):1550147718756311
5.
go back to reference Kumari S, Renuka K (2020) A provably secure biometrics and ecc-based authentication and key agreement scheme for wsns. Int J Commun Syst 33(3):e4194CrossRef Kumari S, Renuka K (2020) A provably secure biometrics and ecc-based authentication and key agreement scheme for wsns. Int J Commun Syst 33(3):e4194CrossRef
6.
go back to reference Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE T Ind Inform 14(8):3599–3609CrossRef Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE T Ind Inform 14(8):3599–3609CrossRef
7.
go back to reference Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2018b) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204 Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2018b) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204
8.
go back to reference Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE T Depend Secure Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE T Depend Secure
9.
go back to reference Vorugunti CS, Mishra B, Amin R, Badoni RP, Sarvabhatla M, Mishra D (2017) Improving security of lightweight authentication technique for heterogeneous wireless sensor networks. Wireless Pers Commun 95(3):3141–3166CrossRef Vorugunti CS, Mishra B, Amin R, Badoni RP, Sarvabhatla M, Mishra D (2017) Improving security of lightweight authentication technique for heterogeneous wireless sensor networks. Wireless Pers Commun 95(3):3141–3166CrossRef
10.
go back to reference Wang C, Xu G, Sun J (2017) An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors-Basel 17(12):2946CrossRef Wang C, Xu G, Sun J (2017) An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors-Basel 17(12):2946CrossRef
11.
go back to reference Wu F, Xu L, Kumari S, Li X (2017) A new and secure authentication scheme for wireless sensor networks with formal proof. Peer Peer Netw Appl 10(1):16–30CrossRef Wu F, Xu L, Kumari S, Li X (2017) A new and secure authentication scheme for wireless sensor networks with formal proof. Peer Peer Netw Appl 10(1):16–30CrossRef
12.
go back to reference Benenson Z, Gärtner FC, Kesdogan D (2004) User authentication in sensor networks. In: GI Jahrestagung (2), Citeseer, pp 385–389 Benenson Z, Gärtner FC, Kesdogan D (2004) User authentication in sensor networks. In: GI Jahrestagung (2), Citeseer, pp 385–389
13.
go back to reference Ko LC (2008) A novel dynamic user authentication scheme for wireless sensor networks. In: 2008 IEEE International Symposium on Wireless Communication Systems ISWCS 2008, IEEE, pp 608–612 Ko LC (2008) A novel dynamic user authentication scheme for wireless sensor networks. In: 2008 IEEE International Symposium on Wireless Communication Systems ISWCS 2008, IEEE, pp 608–612
14.
go back to reference Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, IEEE, pp 986–990 Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, IEEE, pp 986–990
15.
go back to reference Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM, pp 59–64 Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM, pp 59–64
16.
go back to reference Wong KH, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), IEEE, vol 1, pp 8–pp Wong KH, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), IEEE, vol 1, pp 8–pp
17.
go back to reference Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE T Wirel Commun 8(3):1086–1090CrossRef Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE T Wirel Commun 8(3):1086–1090CrossRef
18.
go back to reference Nyang D, Lee MK (2009) Improvement of das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive 2009:631 Nyang D, Lee MK (2009) Improvement of das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive 2009:631
19.
go back to reference Yoo SG, Park KY, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distrib Sens N 8(3):382810CrossRef Yoo SG, Park KY, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distrib Sens N 8(3):382810CrossRef
20.
go back to reference Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors-Basel 10(3):2450–2459CrossRef Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors-Basel 10(3):2450–2459CrossRef
21.
go back to reference He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Ne 10(4):361–371 He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Ne 10(4):361–371
22.
go back to reference Kumar P, Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: 2011 Wireless Advanced, IEEE, pp 241–245 Kumar P, Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: 2011 Wireless Advanced, IEEE, pp 241–245
23.
go back to reference Fan R, Dj He, Xz Pan, Ping Ld (2011) An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J Zhejiang U-Sci C 12(7):550–560CrossRef Fan R, Dj He, Xz Pan, Ping Ld (2011) An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J Zhejiang U-Sci C 12(7):550–560CrossRef
24.
go back to reference Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656CrossRef Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656CrossRef
25.
go back to reference Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef
26.
go back to reference Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer Peer Netw Appl 8(6):1070–1081CrossRef Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer Peer Netw Appl 8(6):1070–1081CrossRef
27.
go back to reference Kalra S, Sood SK (2015) Advanced password based authentication scheme for wireless sensor networks. Journal of information security and applications 20:37–46CrossRef Kalra S, Sood SK (2015) Advanced password based authentication scheme for wireless sensor networks. Journal of information security and applications 20:37–46CrossRef
28.
go back to reference Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors-Basel 13(8):9589–9603CrossRef Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors-Basel 13(8):9589–9603CrossRef
29.
go back to reference Wang D, Wang P (2014a) On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Comput Netw 73:41–57 Wang D, Wang P (2014a) On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Comput Netw 73:41–57
30.
go back to reference Turkanovic M, Holbl M (2013) An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektron Elektrotech 19(6):109–116CrossRef Turkanovic M, Holbl M (2013) An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektron Elektrotech 19(6):109–116CrossRef
31.
go back to reference Amin R, Biswas G (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80CrossRef Amin R, Biswas G (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80CrossRef
32.
go back to reference Althobaiti O, Al-Rodhaan M, Al-Dhelaan A (2013) An efficient biometric authentication protocol for wireless sensor networks. Int J Distrib Sens N 9(5):407971CrossRef Althobaiti O, Al-Rodhaan M, Al-Dhelaan A (2013) An efficient biometric authentication protocol for wireless sensor networks. Int J Distrib Sens N 9(5):407971CrossRef
33.
go back to reference Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1):e2933CrossRef Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1):e2933CrossRef
34.
go back to reference Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112CrossRef Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112CrossRef
35.
go back to reference Farash MS, Turkanović M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36:152–176CrossRef Farash MS, Turkanović M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36:152–176CrossRef
36.
go back to reference Singh A, Awasthi AK, Singh K (2017) Cryptanalysis and improvement in user authentication and key agreement scheme for wireless sensor network. Wireless Pers Commun 94(3):1881–1898CrossRef Singh A, Awasthi AK, Singh K (2017) Cryptanalysis and improvement in user authentication and key agreement scheme for wireless sensor network. Wireless Pers Commun 94(3):1881–1898CrossRef
37.
go back to reference Chang CC, Le HD (2015) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE T Wirel Commun 15(1):357–366CrossRef Chang CC, Le HD (2015) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE T Wirel Commun 15(1):357–366CrossRef
38.
go back to reference Das AK, Kumari S, Odelu V, Li X, Wu F, Huang X (2016) Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur Commun Netw 9(16):3670–3687CrossRef Das AK, Kumari S, Odelu V, Li X, Wu F, Huang X (2016) Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur Commun Netw 9(16):3670–3687CrossRef
39.
go back to reference Jung J, Kim J, Choi Y, Won D (2016) An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sensors-Basel 16(8):1299CrossRef Jung J, Kim J, Choi Y, Won D (2016) An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sensors-Basel 16(8):1299CrossRef
40.
go back to reference Alotaibi M (2018) An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for wsn. IEEE Access 6:70072–70087CrossRef Alotaibi M (2018) An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for wsn. IEEE Access 6:70072–70087CrossRef
41.
go back to reference Xiong L, Peng D, Peng T, Liang H, Liu Z (2017) A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors-Basel 17(11):2681CrossRef Xiong L, Peng D, Peng T, Liang H, Liu Z (2017) A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors-Basel 17(11):2681CrossRef
42.
go back to reference Amin R, Islam SH, Biswas G, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62CrossRef Amin R, Islam SH, Biswas G, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62CrossRef
43.
go back to reference Singh D, Kumar B, Singh S, Chand S (2019) Smac-as: Mac based secure authentication scheme for wireless sensor network. Wireless Pers Commun 107(2):1289–1308CrossRef Singh D, Kumar B, Singh S, Chand S (2019) Smac-as: Mac based secure authentication scheme for wireless sensor network. Wireless Pers Commun 107(2):1289–1308CrossRef
44.
go back to reference Tyagi G, Kumar R (2021) An improved multifactor user authentication scheme for wireless sensor networks. Wirel Pers Commun pp 1–33 Tyagi G, Kumar R (2021) An improved multifactor user authentication scheme for wireless sensor networks. Wirel Pers Commun pp 1–33
45.
go back to reference Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE T Ind Inform 14(9):4081–4092CrossRef Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE T Ind Inform 14(9):4081–4092CrossRef
46.
go back to reference Wang D, Wang P, Wang C (2020a) Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in wsns. ACM Transactions on Cyber-Physical Systems 4(3):1–26 Wang D, Wang P, Wang C (2020a) Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in wsns. ACM Transactions on Cyber-Physical Systems 4(3):1–26
47.
go back to reference Wu F, Li X, Xu L, Vijayakumar P, Kumar N (2020) A novel three-factor authentication protocol for wireless sensor networks with iot notion. IEEE Syst J 15(1):1120–1129CrossRef Wu F, Li X, Xu L, Vijayakumar P, Kumar N (2020) A novel three-factor authentication protocol for wireless sensor networks with iot notion. IEEE Syst J 15(1):1120–1129CrossRef
48.
go back to reference Wu TY, Yang L, Lee Z, Chu SC, Kumari S, Kumar S (2021) A provably secure three-factor authentication protocol for wireless sensor networks. Wirel. Commun Mob Comput2021 Wu TY, Yang L, Lee Z, Chu SC, Kumari S, Kumar S (2021) A provably secure three-factor authentication protocol for wireless sensor networks. Wirel. Commun Mob Comput2021
49.
go back to reference Fan Q, Chen J, Xu F, Li L, Luo M (2021) A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience p e6178 Fan Q, Chen J, Xu F, Li L, Luo M (2021) A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience p e6178
50.
go back to reference Li W, Li B, Zhao Y, Wang P, Wei F (2018a) Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks. Wirel Commun Mob Comp 2018 Li W, Li B, Zhao Y, Wang P, Wei F (2018a) Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks. Wirel Commun Mob Comp 2018
51.
go back to reference Wang D, Zhang X, Zhang Z, Wang P (2020b) Understanding security failures of multi-factor authentication schemes for multi-server environments. Comput Secur 88:101619 Wang D, Zhang X, Zhang Z, Wang P (2020b) Understanding security failures of multi-factor authentication schemes for multi-server environments. Comput Secur 88:101619
52.
go back to reference Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference, Springer, pp 388–397 Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference, Springer, pp 388–397
53.
go back to reference Veyrat-Charvillon N, Standaert FX (2011) Generic side-channel distinguishers: Improvements and limitations. In: Annual Cryptology Conference, Springer, pp 354–372 Veyrat-Charvillon N, Standaert FX (2011) Generic side-channel distinguishers: Improvements and limitations. In: Annual Cryptology Conference, Springer, pp 354–372
54.
go back to reference Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2010) A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE T Parall Distr Systems 22(8):1390–1397CrossRef Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2010) A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE T Parall Distr Systems 22(8):1390–1397CrossRef
55.
go back to reference Jiang Q, Qian Y, Ma J, Ma X, Cheng Q, Wei F (2019) User centric three-factor authentication protocol for cloud-assisted wearable devices. Int J Commun Syst 32(6):e3900CrossRef Jiang Q, Qian Y, Ma J, Ma X, Cheng Q, Wei F (2019) User centric three-factor authentication protocol for cloud-assisted wearable devices. Int J Commun Syst 32(6):e3900CrossRef
56.
go back to reference Burton DM (2006) Elementary number theory. Tata McGraw-Hill Education Burton DM (2006) Elementary number theory. Tata McGraw-Hill Education
57.
go back to reference Mason JC, Handscomb DC (2002) Chebyshev polynomials. Chapman and Hall/CRC Mason JC, Handscomb DC (2002) Chebyshev polynomials. Chapman and Hall/CRC
58.
go back to reference Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener Comp Sy 63:56–75CrossRef Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener Comp Sy 63:56–75CrossRef
59.
go back to reference Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 453–474 Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 453–474
60.
go back to reference Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: Security and privacy concerns. IEEE Secur Priv 1(2):33–42CrossRef Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: Security and privacy concerns. IEEE Secur Priv 1(2):33–42CrossRef
62.
go back to reference Sierra JM, Hernández JC, Alcaide A, Torres J (2004) Validating the use of ban logic. In: International Conference on Computational Science and Its Applications, Springer, pp 851–858 Sierra JM, Hernández JC, Alcaide A, Torres J (2004) Validating the use of ban logic. In: International Conference on Computational Science and Its Applications, Springer, pp 851–858
63.
go back to reference Wang D, Zhang Z, Wang P, Yan J, Huang X (2016) Targeted online password guessing: An underestimated threat. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 1242–1254 Wang D, Zhang Z, Wang P, Yan J, Huang X (2016) Targeted online password guessing: An underestimated threat. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 1242–1254
64.
go back to reference Abbasinezhad-Mood D, Ostad-Sharif A, Nikooghadam M (2020) Efficient provably-secure privacy-preserving signature-based key establishment protocol. Ad Hoc Netw 100:102062CrossRef Abbasinezhad-Mood D, Ostad-Sharif A, Nikooghadam M (2020) Efficient provably-secure privacy-preserving signature-based key establishment protocol. Ad Hoc Netw 100:102062CrossRef
65.
go back to reference Tan Z (2021) Privacy-preserving two-factor key agreement protocol based on chebyshev polynomials. Security and Communication Networks 2021 Tan Z (2021) Privacy-preserving two-factor key agreement protocol based on chebyshev polynomials. Security and Communication Networks 2021
Metadata
Title
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
Authors
Gaurav Tyagi
Rahul Kumar
Publication date
17-10-2022
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01391-8

Other articles of this Issue 1/2023

Peer-to-Peer Networking and Applications 1/2023 Go to the issue

Premium Partner