Online citations, reference lists, and bibliographies.
← Back to Search

An Efficient Two-factor User Authentication Scheme With Unlinkability For Wireless Sensor Networks

Q. Jiang, J. Ma, X. Lu, Youliang Tian
Published 2015 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
User authentication with unlinkability is one of the corner stone services for many security and privacy services which are required to secure communications in wireless sensor networks (WSNs). Recently, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs, and claimed that their scheme achieves identity and password protection, and the resiliency of stolen smart card attacks. However, we observe that Xue et al.’s scheme is subject to identity guessing attack, tracking attack, privileged insider attack and weak stolen smart card attack. In order to fix the drawbacks, we propose an enhanced authentication scheme with unlinkability. Additionally, the proposed scheme further cuts the computational cost. Therefore, the proposed scheme not only remedies its security flaws but also improves its performance. It is more suitable for practical applications of WSNs than Xue et al.’s scheme.
This paper references
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1109/TIE.2009.2028351
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
Xiangxue Li (2010)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1007/s00779-012-0540-3
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
Da-Zhi Sun (2012)
10.1002/sec.315
Robust smart-cards-based user authentication scheme with user anonymity
Shuhua Wu (2012)
10.1007/s11277-012-0535-4
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks
Qi Jiang (2013)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1109/JSYST.2013.2271537
An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid
H. Li (2014)
10.1109/TIE.2008.921677
Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
W. Juang (2008)
10.1002/sat.993
A simple and efficient authentication scheme for mobile satellite communication systems
C. Lee (2012)
10.1109/TPDS.2011.180
Leveraging Prediction to Improve the Coverage of Wireless Sensor Networks
Shibo He (2012)
10.1002/DAC.V23:9/10
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
B. Vaidya (2010)
10.1016/S1389-1286(01)00302-4
Wireless sensor networks: a survey
I. Akyildiz (2002)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
10.1002/dac.2468
Security flaws in two improved remote user authentication schemes using smart cards
C. Ma (2014)
10.1007/978-3-642-30436-1_40
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks
Y. Wang (2012)
10.1155/2012/382810
A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
S. Yoo (2012)
10.1007/3-540-48405-1_25
Differential Power Analysis
Paul C. Kocher (1999)
10.1007/s10916-011-9658-5
A More Secure Authentication Scheme for Telecare Medicine Information Systems
He Debiao (2012)
10.3390/s110505020
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
P. Kumar (2011)
10.1109/TPDS.2012.100
Maintaining Quality of Sensing with Actors in Wireless Sensor Networks
Shibo He (2012)
10.1016/j.jcss.2008.04.002
Two-factor mutual authentication based on smart cards and passwords
G. Yang (2008)
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks
Jiang (2012)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.1002/sec.517
Two-factor mutual authentication with key agreement in wireless sensor networks
B. Vaidya (2016)
10.1007/springerreference_213
Differential Power Analysis
Siva Sai Yerubandi (2002)
10.1002/SEC.506
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
D. He (2012)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
10.1109/TPDS.2012.72
COSE: A Query-Centric Framework of Collaborative Heterogeneous Sensor Networks
Yuan He (2012)
10.1007/s12083-012-0129-7
Practical authentication scheme for SIP
Shuhua Wu (2013)
10.1109/TPDS.2013.36
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
Haojin Zhu (2014)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1109/SECON.2010.5508271
Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks
Shibo He (2010)
10.1109/TPDS.2013.124
EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid
H. Li (2014)
2012)Maintaining quality of sensing with actors in wireless sensor network
S He (2012)
10.1109/MWC.2012.6393525
Security and privacy of collaborative spectrum sensing in cognitive radio networks
Zhaoyu Gao (2012)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1109/MMIT.2010.80
An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
Qiong Pu (2010)
10.1007/s12083-012-0125-y
Secure verifier-based three-party password-authenticated key exchange
Qiong Pu (2013)
Practical authentication scheme for SIP. Peer-to-Peer Netw
S Wu (2013)



This paper is referenced by
Weaknesses of Temporal Credential-Based Mutual Authentication with a Multiple-Password Scheme for Wireless Sensor Networks
Younsung Choi (2017)
10.3390/s18113663
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
Seyed Farhad Aghili (2018)
10.1007/s10586-017-1151-6
Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks
Ayush Sogani (2017)
10.1109/ACCESS.2020.3010372
Design of Layered and Heterogeneous Network Routing Algorithm for Field Observation Instruments
Jiuyuan Huo (2020)
10.1016/j.jnca.2017.07.001
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X. Li (2018)
10.1007/s10916-016-0587-1
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth
Qi Jiang (2016)
10.1016/j.future.2017.08.042
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1109/JIOT.2017.2780232
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
10.1007/978-981-10-6898-0_7
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem
A. Maurya (2017)
10.1007/978-3-030-37337-5_15
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps
Jiaxi Hu (2019)
10.1007/978-3-319-99010-1_41
A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks
M. M. Mansour (2018)
10.1007/s12083-014-0324-9
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
A. K. Das (2016)
10.1155/2019/2136506
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
Jiaqing Mo (2019)
10.1080/09720529.2019.1627072
A secure three-factor authentication scheme for wireless sensor networks using ECC
Devender Kumar (2020)
10.1007/s10586-017-1575-z
A security-enhanced mutual authentication scheme with privacy protected in wireless sensor networks
Haitao Yu (2017)
10.1007/978-3-319-49106-6_87
A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption
Fushan Wei (2016)
10.1002/sec.1602
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
S. Kumari (2016)
10.3390/s17112681
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
Ling Xiong (2017)
10.3390/ELECTRONICS8040450
A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT
Yousheng Zhou (2019)
10.1371/journal.pone.0161340
Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks
M. Liaqat (2016)
10.1155/2018/6328504
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks
Jiawei Tang (2018)
10.1007/s11277-020-07385-0
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
10.1007/s12083-017-0627-8
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
AmirHosein Adavoudi-Jolfaei (2019)
10.1007/s11235-016-0222-y
EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs
Yong Xie (2017)
10.1002/sec.1707
Provably secure three-factor authentication and key agreement scheme for session initiation protocol
S. Challa (2016)
10.1002/cpe.3930
On the design of a secure user authentication and key agreement scheme for wireless sensor networks
S. Kumari (2017)
10.1371/journal.pone.0116709
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
Junghyun Nam (2015)
10.1007/s10916-016-0590-6
A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems
Hu Xiong (2016)
10.1007/s11277-016-3739-1
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
Han Shen (2017)
10.1109/TIE.2016.2585081
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope (2016)
10.1007/s10916-016-0629-8
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
X. Li (2016)
See more
Semantic Scholar Logo Some data provided by SemanticScholar