Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Wireless sensor networks (WSNs) have rapidly increased to be applicable in many different areas due to their wireless mobile connectivity, large scale deployment and ad hoc network. However, these characteristics make WSNs usually deployed in unattended and hostile field, which may bring some new threats such as information tampering and eavesdropping attacks, etc. User authentication is one of the most important security services that allowed the legitimate user to query and collect the real-time data from a sensor node in WSN. Since the sensor nodes are resource-constrained devices which have limited storage, power and computing resource, the proposed authentication scheme should be low cost and lightweight. Recently, Gope et al. proposed a two-factor lightweight authentication scheme for real-time data access in WSN. However, according to the analysis, there still exist several drawbacks in their scheme as well as in other two-factor schemes. In this paper, we propose a novel lightweight three-factor authentication scheme for WSN to withstand such threats as well as providing higher operational efficiency than most of the recently presented schemes. Both analysis and simulation show that our scheme is more suitable for the security real-time data access in WSN.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Lamport, L. (1998). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772. CrossRef
Wu, T. D. (1998). The secure remote password protocol. In NDSS (Vol. 98).
Chang, C.-C., & Wu, T.-C. (1991). Remote password authentication with smart cards. IEE Proceedings E (Computers and Digital Techniques), 138(3), 165–168. CrossRef
Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712. CrossRef
Daojing, H., et al. (2010). An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 10(4), 361–371.
Huang, H.-F., Ya-Fen, C., & Chun-Hung, L. (2010). Enhancement of two-factor user authentication in wireless sensor networks. In Intelligent information hiding and multimedia signal processing (IIH-MSP), 2010 sixth international conference on. IEEE.
Vaidya, B., Dimitrios, M., & Hussein, T. M. (2010). Improved two-factor user authentication in wireless sensor networks. In Wireless and mobile computing, networking and communications (WiMob), 2010 IEEE 6th international conference on. IEEE.
Yoo, S. G., Park, K. Y., & Kim, J. (2012). A security-performance-balanced user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks, 8(3), 382810. CrossRef
Sun, D.-Z., et al. (2013). On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Personal and Ubiquitous Computing, 17(5), 895–905. CrossRef
Wong, K. H. M., et al. (2006). A dynamic user authentication scheme for wireless sensor networks. In Sensor networks, ubiquitous, and trustworthy computing, 2006. IEEE international conference on (Vol. 1). IEEE.
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090. CrossRef
Nyang, D. H., & Lee, M.-K. (2009). Improvement of Das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive, 2009, 631.
Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors, 10(3), 2450–2459. CrossRef
Fan, R., et al. (2010). A secure and efficient user authentication protocol for two-tiered wireless sensor networks. In Circuits, communications and system (PACCS), 2010 second Pacific-Asia conference on (Vol. 1). IEEE.
Turkanovic, M., Brumen, B., & Holbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks, 20, 96–112. CrossRef
Amin, R., & Biswas, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58–80. CrossRef
Farash, M. S., et al. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks, 36, 152–176. CrossRef
Gope, P., & Hwang, T. (2016). A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics, 63(11), 7124–7132. CrossRef
Li, X., et al. (2014). Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks, 7(10), 1488–1497.
He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal, 9(3), 816–823. CrossRef
Jiang, Q., et al. (2016). A privacy preserving three-factor authentication protocol for e-Health clouds. The Journal of Supercomputing, 72(10), 3826–3849. CrossRef
Xiong, L., et al. (2017). A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors, 17(11), 2681. CrossRef
Wang, C., Guoai, X., & Sun, J. (2017). An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors, 17(12), 2946. CrossRef
Das, A. K. (2016). A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Networking and Applications, 9(1), 223–244. CrossRef
Das, A. K. (2015). A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Personal Communications, 82(3), 1377–1404. CrossRef
Wu, F., et al. (2018). An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications, 11(1), 1–20. CrossRef
Amin, R., et al. (2016). Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Computer Networks, 101, 42–62. CrossRef
Jiang, Q., et al. (2017). Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access, 5, 3376–3392. CrossRef
Wang, D., & Wang, P. (2016). Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Transactions on Dependable and Secure Computing.
Bond, M., et al. (2014). Chip and Skim: Cloning EMV cards with the pre-play attack. In Security and privacy (SP), 2014 IEEE Symposium on. IEEE.
Wang, D., & Wang, P. (2014). On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Computer Networks, 73, 41–57. CrossRef
Gunson, N., Marshall, D., et al. (2011). User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Computers & Security, 30(4), 208–220. CrossRef
Madhusudhan, R., & Mittal, R. C. (2012). Dynamic ID-based remote user password authentication schemes using smart cards: A review. Journal of Network and Computer Applications, 35(4), 1235–1248. CrossRef
Dodis, Y., Reyzin, L., & Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International conference on the theory and applications of cryptographic techniques. Berlin: Springer. CrossRef
Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Annual international cryptology conference. Berlin: Springer. CrossRef
AVISPA Automated Validation of Internet Security Protocols and Applications. Last Accessed on April 25, 2016. [Online]. http://www.avispa-project.org/.
Von Oheimb, D. (2005). The high-level protocol specification language HLPSL developed in the EU project AVISPA. In Proceedings of APPSEM workshop.
Secure Hash Standard FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (1995).
- Lightweight three factor scheme for real-time data access in wireless sensor networks
- Springer US
The Journal of Mobile Communication, Computation and Information
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196