Online citations, reference lists, and bibliographies.
← Back to Search

Provably Secure User Authentication And Key Agreement Scheme For Wireless Sensor Networks

A. K. Das, S. Kumari, Vanga Odelu, X. Li, F. Wu, Xinyi Huang
Published 2016 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
In recent years, user authentication has emerged as an interesting field of research in wireless sensor networks. Most recently, in 2016, Chang and Le presented a scheme to authenticate the users in wireless sensor network using a password and smart card. They proposed two protocols P1 and P2. P1 is based on exclusive or XOR and hash functions, while P2 deploys elliptic curve cryptography in addition to the two functions used in P1. Although their protocols are efficient, we point out that both P1 and P2 are vulnerable to session specific temporary information attack and offline password guessing attack, while P1 is also vulnerable to session key breach attack. In addition, we show that both the protocols P1 and P2 are inefficient in authentication and password change phases. To withstand these weaknesses found in their protocols, we aim to design a new authentication and key agreement scheme using elliptic curve cryptography. Rigorous formal security proofs using the broadly accepted, the random oracle models, and the Burrows-Abadi-Needham logic and verification using the well-known Automated Validation of Internet Security Protocols and Applications tool are preformed on our scheme. The analysis shows that our designed scheme has the ability to resist a number of known attacks comprising those found in both Chang-Le's protocols. Copyright © 2016 John Wiley & Sons, Ltd.
This paper references
A privacy preserving three-factor authentication protocol for e-Health clouds
Qi Jiang (2015)
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang (2015)
Fuzzy extractors : How to generate strong keys from biometrics and other noisy data
Suela Kodra (2015)
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
P. Pessl (2016)
A privacy preserving three-factor authentication protocol for ehealth clouds. The Journal of Supercomputing 2016, DOI: 10.1007/s11227-015-1610-x
Q Jiang (2016)
OFMC: A Symbolic Model-Checker for Security Protocols
D. Basin (2004)
Effective Key Management in Dynamic Wireless Sensor Networks
Seung-Hyun Seo (2015)
An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
Muhamed Turkanovic (2013)
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms
Vanga Odelu (2016)
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks
Qi Jiang (2014)
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
Http:// php/.[Accessed on September 2015
A. K. Das (2015)
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
A. K. Das (2017)
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
Vanga Odelu (2015)
Cryptography and Network Security: Principles and Practice
W. Stallings (1998)
An advanced temporal credentialbased security scheme with mutual authentication and key agreement for wireless sensor networks
CT Li (2013)
A logic of authentication
M. Burrows (1990)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
A. K. Das (2011)
One-to-many authentication for access control in mobile pay-TV systems
D. He (2015)
Differential Power Analysis
Paul C. Kocher (1999)
Cryptography and network security - principles and practice (3. ed.)
W. Stallings (1999)
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
A. Armando (2005)
A secure and robust temporal credentialbased threefactor user authentication scheme for wireless sensor networks
AK Das (2016)
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
A. K. Das (2016)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network
H. T. Nguyen (2009)
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
R. Canetti (2001)
Enhanced three-factor security protocol for consumer USB mass storage devices
D. He (2014)
Biometric identification
Anil K. Jain (2000)
An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks
A. K. Das (2015)
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
User authentication schemes for wireless sensor networks: A review
S. Kumari (2015)
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Qi Jiang (2016)
Anonymous Authentication for Wireless Body Area Networks With Provable Security
D. He (2017)
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
An efficient biometrics-based remote user authentication scheme using smart cards
C. Li (2010)
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
A. K. Das (2015)
On the security of public key protocols
D. Dolev (1981)
Impact of RF mismatches on the performance of massive MIMO systems with ZF precoding
H. Wei (2015)
Password-Based Authenticated Key Exchange in the Three-Party Setting
M. Abdalla (2004)
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
N. T. Huyen (2012)
An efficient multigateway based threefactor user authentication and key agreement scheme in hierarchical wireless sensor networks
AK Das (2016)
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)

This paper is referenced by
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
M. Wazid (2020)
IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes
Mehranpoor. Shayan (2019)
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT
Seyed Farhad Aghili (2020)
Blockchain-based batch authentication protocol for Internet of Vehicles
Palak Bagga (2020)
Cryptographic Solutions for Cyber-Physical System Security
Chenglu Jin (2019)
A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
Favian Dewanta (2019)
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang (2020)
On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC
Anil Kumar Sutrala (2018)
Barriers and Facilitators That Influence Telemedicine-Based, Real-Time, Online Consultation at Patients’ Homes: Systematic Literature Review
Hassan Khader Y Almathami (2020)
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs
Z. Yang (2019)
An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN
M. Alotaibi (2018)
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems
S. Challa (2020)
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system
P. Soni (2019)
Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities"
M. Karuppiah (2017)
Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings
Adhirath Kabra (2020)
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
J. He (2018)
PSP: proximity-based secure pairing of mobile devices using WiFi signals
Weirong Cui (2019)
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
M. Karuppiah (2019)
An Efficient Biometric based three-factor authentication scheme for Wireless Sensor Network
D. Singh (2018)
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment
Chenyu Wang (2018)
Attribute-based authentication on the cloud for thin clients
M. Ibrahim (2016)
ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment
B. Alzahrani (2020)
Taxonomy of secure data dissemination techniques for IoT environment
Umesh Bodkhe (2020)
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
Devender Kumar (2020)
Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks
I. Santos-González (2020)
A three-factor anonymous user authentication scheme for Internet of Things environments
Hakjun Lee (2020)
On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks
Joonyoung Lee (2020)
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
A. K. Das (2018)
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
Kyung-Ah Shim (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar