Online citations, reference lists, and bibliographies.
← Back to Search

A Secure And Robust Temporal Credential-based Three-factor User Authentication Scheme For Wireless Sensor Networks

A. K. Das
Published 2016 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy
User authentication is one of the most important security services required for the resource-constrained wireless sensor networks (WSNs). In user authentication, for critical applications of WSNs, a legitimate user is allowed to query and collect the real-time data at any time from a sensor node of the network as and when he/she demands for it. In order to get the real-time information from the nodes, the user needs to be first authenticated by the nodes as well as the gateway node (GWN) of WSN so that illegal access to nodes do not happen in the network. Recently, Jiang et al. proposed an efficient two-factor user authentication scheme with unlinkability property in WSNs Jiang (2014). In this paper, we analyze Jiang et al.’s scheme. Unfortunately, we point out that Jiang et al.’s scheme has still several drawbacks such as (1) it fails to protect privileged insider attack, (2) inefficient registration phase for the sensor nodes, (3) it fails to provide proper authentication in login and authentication phase, (4) it fails to update properly the new changed password of a user in the password update phase, (5) it lacks of supporting dynamic sensor node addition after initial deployment of nodes in the network, and (6) it lacks the formal security verification. In order to withstand these pitfalls found in Jiang et al.’s scheme, we aim to propose a three-factor user authentication scheme for WSNs. Our scheme preserves the original merits of Jiang et al.’s scheme. Our scheme is efficient as compared to Jiang et al.’s scheme and other schemes. Furthermore, our scheme provides better security features and higher security level than other schemes. In addition, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. The simulation results clearly demonstrate that our scheme is also secure.
This paper references
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
A. Armando (2005)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang (2010)
Enhanced three-factor security protocol for consumer USB mass storage devices
D. He (2014)
New directions in cryptography
W. Diffie (1976)
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
A. K. Das (2012)
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)
An efficient dynamic group key agreement protocol for imbalanced wireless networks
Yun-Hsin Chuang (2010)
Differential Power Analysis
Siva Sai Yerubandi (2002)
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
A Biometric Identity Based Signature Scheme
A. Burnett (2004)
On the security of public key protocols
D. Dolev (1981)
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
Da-Zhi Sun (2012)
Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2014)
An efficient biometrics-based remote user authentication scheme using smart cards
C. Li (2010)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA
David von Oheimb (2005)
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
M. Khan (2008)
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Vanga Odelu (2014)
A method for obtaining digital signatures and public-key cryptosystems
R. Rivest (1983)
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
OFMC: A symbolic model checker for security protocols
D. Basin (2004)
A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems
Zuowen Tan (2014)
A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
S. Yoo (2012)
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis (2004)
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
A. K. Das (2011)
Improved two-factor user authentication in wireless sensor networks
B. Vaidya (2010)
Some Observations on the Theory of Cryptographic Hash Functions
D. Stinson (2001)
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
A. K. Das (2013)
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
A. K. Das (2013)
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
A biometric-based user authentication for wireless sensor networks
J. Yuan (2010)
A Simple and Generic Construction of Authenticated Encryption with Associated Data
P. Sarkar (2010)
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
X. Li (2011)
Combined Spline and B-spline for an Improved Automatic Skin Lesion Segmentation in Dermoscopic Images Using Optimal Color Channel
A. A. Abbas (2014)

This paper is referenced by
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks
M. Wazid (2017)
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
Sumit Pundir (2020)
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
Seyed Farhad Aghili (2018)
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment
M. Wazid (2019)
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards
Goutham Reddy Alavalapati (2016)
An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems
Jiaqing Mo (2020)
A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception
Lili Xu (2019)
An improved and provably secure three-factor user authentication scheme for wireless sensor networks
F. Wu (2018)
Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks
S. Banerjee (2018)
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
AmirHosein Adavoudi-Jolfaei (2019)
Trust Model of Wireless Sensor Networks Based on Shannon Entropy
J. Hu (2016)
Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks
Jiaqing Mo (2020)
Lightweight three factor scheme for real-time data access in wireless sensor networks
Hanguang Luo (2020)
Design of a secure smart card-based multi-server authentication scheme
A. Chaturvedi (2016)
A Lightweight Anonymous Client–Server Authentication Scheme for the Internet of Things Scenario: LAuth
Yuwen Chen (2018)
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor
S. H. Islam (2016)
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
An Improved Authentication Protocol Using Smart Cards for the Internet of Things
Cao Shou-qi (2019)
A new three-factor authentication scheme overcome repeat registered attack for wireless sensor networks
Ye Li (2020)
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope (2016)
Cryptanalysis and improvement of a three-factor user authentication scheme for smart grid environment
Harmanpreet Singh Grover (2020)
Signature-based three-factor authenticated key exchange for internet of things applications
Xiaoying Jia (2017)
Authentication Protocols for Internet of Things: A Comprehensive Survey
M. Ferrag (2017)
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment
M. Wazid (2017)
Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System
R. Ali (2018)
Scalable and Low Overhead Watermarking Based Integrated Authentication and Encryption Scheme for Wireless Sensor Networks
T. Gambhir (2017)
A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
S. Kumari (2020)
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
Omid Mir (2017)
On the security of a realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks
Ling Xiong (2017)
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S. Kumari (2018)
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang (2020)
See more
Semantic Scholar Logo Some data provided by SemanticScholar