Skip to main content
Top

2012 | OriginalPaper | Chapter

Weakness of Tan’s Two-Factor User Authentication Scheme in Wireless Sensor Networks

Authors : Youngsook Lee, Jeeyeon Kim, Dongho Won

Published in: Computer Science and its Applications

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As wireless sensor networks (WSN) continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is important that these security concerns be addressed from the beginning of the system design. So WSN requires main security goal of authenticating among a remote individual, the sensor nodes, and the gateway node. In 2011, Tan proposed a two-factor user authentication scheme suited for WSN environments, in which users can be authenticated using a single password shared with the gateway node. A fundamental requirement for password-based authentication is security against off-line password guessing attack. However, Tan’s scheme does not meet the requirement. In this work, we demonstrate this security problem with Tan’s user authentication scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
 <ID i , C i , A i , T 1 > was incorrectly stated as < ID i , SID j , C i , A i , T 1 > in the seventeenth-to-last line of Sect. 3 of [16].
 
Literature
1.
go back to reference Rathod, V., Mehta, M.: Security in wireless sensor network: a survey. GANPAT Univ. J. Eng. Technol. 1(1), 35–44 (2011) Rathod, V., Mehta, M.: Security in wireless sensor network: a survey. GANPAT Univ. J. Eng. Technol. 1(1), 35–44 (2011)
2.
go back to reference Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114
3.
go back to reference Chang, C., Kuo, J.Y.: An efficient multi-server password authenticated keys agreement scheme using smart cards with access control. In: IEEE Proceeding of the 19th International Conference on Advanced Information Networking and Applications 2, 257–260 (2005) Chang, C., Kuo, J.Y.: An efficient multi-server password authenticated keys agreement scheme using smart cards with access control. In: IEEE Proceeding of the 19th International Conference on Advanced Information Networking and Applications 2, 257–260 (2005)
4.
go back to reference Ku, W.-C., Chang, S.-T., Chiang, M.-H.: Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture. IEICE Trans. Commun. E88-B(8), 3451–3454 (2005) Ku, W.-C., Chang, S.-T., Chiang, M.-H.: Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture. IEICE Trans. Commun. E88-B(8), 3451–3454 (2005)
5.
go back to reference Li, L.-H., Lin, I.-C., Hwang, M.-S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. Neural Netw. 12(6), 1498–1504 (2001) Li, L.-H., Lin, I.-C., Hwang, M.-S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. Neural Netw. 12(6), 1498–1504 (2001)
6.
go back to reference Lin, I.-C., Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme for multi-server internet environments. Futur. Gener. Comput. Syst. 19, 13–22 (2003) Lin, I.-C., Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme for multi-server internet environments. Futur. Gener. Comput. Syst. 19, 13–22 (2003)
7.
go back to reference Sun, H.-M.: An efficient remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46(4), 958–961 (2000)CrossRef Sun, H.-M.: An efficient remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46(4), 958–961 (2000)CrossRef
8.
go back to reference Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27, 115–121 (2008)CrossRef Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27, 115–121 (2008)CrossRef
9.
go back to reference Tsuar, W.-J.: An enhanced user authentication scheme for multi-server internet services. Appl. Math. Comput. 170, 258–266 (2005)MathSciNetCrossRef Tsuar, W.-J.: An enhanced user authentication scheme for multi-server internet services. Appl. Math. Comput. 170, 258–266 (2005)MathSciNetCrossRef
10.
go back to reference Tsuar, W.-J., Wu, C–.C., Lee, W.-B.: A flexible user authentication for multi-server internet services, Networking-JCN. LNCS 2093(2001), 174–183 (2001) Tsuar, W.-J., Wu, C–.C., Lee, W.-B.: A flexible user authentication for multi-server internet services, Networking-JCN. LNCS 2093(2001), 174–183 (2001)
11.
go back to reference Tsuar, W.-J., Wu, C–.C., Lee, W.-B.: A smart card-based remote scheme for password authentication in multi-server Internet services. Comput. Stand. Interfaces 27, 39–51 (2004)CrossRef Tsuar, W.-J., Wu, C–.C., Lee, W.-B.: A smart card-based remote scheme for password authentication in multi-server Internet services. Comput. Stand. Interfaces 27, 39–51 (2004)CrossRef
12.
go back to reference Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel. Comm. 8, 1086–1090 (2009) Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel. Comm. 8, 1086–1090 (2009)
13.
go back to reference Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10, 2450–2459 (2010)CrossRef Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10, 2450–2459 (2010)CrossRef
14.
go back to reference Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006) Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
15.
go back to reference Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8(4), 205–219, Inderscience Publishers (2011) Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8(4), 205–219, Inderscience Publishers (2011)
16.
go back to reference Tan, Z.: Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks. Adv. Inf. Sci. Serv. Sci. 6(4), 117–128 (2011) Tan, Z.: Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks. Adv. Inf. Sci. Serv. Sci. 6(4), 117–128 (2011)
17.
go back to reference Lee, Y., Won, D.: Security vulnerabilities of a remote user authentication scheme using smart cards suited for a multi-server environment. LNCS, 5593, 164–172 (2009) Lee, Y., Won, D.: Security vulnerabilities of a remote user authentication scheme using smart cards suited for a multi-server environment. LNCS, 5593, 164–172 (2009)
18.
go back to reference Tian, X., Zhu, R.W., Wong, D.S.: Improved efficient remote user authentication schemes. Int. J. Netw. Secur. 4(2), 149–154 (2007) Tian, X., Zhu, R.W., Wong, D.S.: Improved efficient remote user authentication schemes. Int. J. Netw. Secur. 4(2), 149–154 (2007)
19.
go back to reference Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology-Crypto’99. Springer, Berlin (1999) pp. 388–397 Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology-Crypto’99. Springer, Berlin (1999) pp. 388–397
20.
go back to reference Messergers, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)MathSciNetCrossRef Messergers, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)MathSciNetCrossRef
Metadata
Title
Weakness of Tan’s Two-Factor User Authentication Scheme in Wireless Sensor Networks
Authors
Youngsook Lee
Jeeyeon Kim
Dongho Won
Copyright Year
2012
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-5699-1_72

Premium Partner