Online citations, reference lists, and bibliographies.
← Back to Search

A Secure And Robust Temporal Credential-based Three-factor User Authentication Scheme For Wireless Sensor Networks

A. K. Das
Published 2016 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy
Share
User authentication is one of the most important security services required for the resource-constrained wireless sensor networks (WSNs). In user authentication, for critical applications of WSNs, a legitimate user is allowed to query and collect the real-time data at any time from a sensor node of the network as and when he/she demands for it. In order to get the real-time information from the nodes, the user needs to be first authenticated by the nodes as well as the gateway node (GWN) of WSN so that illegal access to nodes do not happen in the network. Recently, Jiang et al. proposed an efficient two-factor user authentication scheme with unlinkability property in WSNs Jiang (2014). In this paper, we analyze Jiang et al.’s scheme. Unfortunately, we point out that Jiang et al.’s scheme has still several drawbacks such as (1) it fails to protect privileged insider attack, (2) inefficient registration phase for the sensor nodes, (3) it fails to provide proper authentication in login and authentication phase, (4) it fails to update properly the new changed password of a user in the password update phase, (5) it lacks of supporting dynamic sensor node addition after initial deployment of nodes in the network, and (6) it lacks the formal security verification. In order to withstand these pitfalls found in Jiang et al.’s scheme, we aim to propose a three-factor user authentication scheme for WSNs. Our scheme preserves the original merits of Jiang et al.’s scheme. Our scheme is efficient as compared to Jiang et al.’s scheme and other schemes. Furthermore, our scheme provides better security features and higher security level than other schemes. In addition, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. The simulation results clearly demonstrate that our scheme is also secure.
This paper references
10.1007/11513988_27
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
A. Armando (2005)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1109/IIHMSP.2010.14
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang (2010)
10.1109/TCE.2014.6780922
Enhanced three-factor security protocol for consumer USB mass storage devices
D. He (2014)
10.1109/TIT.1976.1055638
New directions in cryptography
W. Diffie (1976)
10.1016/j.ins.2012.04.036
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
A. K. Das (2012)
10.1007/s12083-014-0285-z
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)
10.1002/nem.739
An efficient dynamic group key agreement protocol for imbalanced wireless networks
Yun-Hsin Chuang (2010)
10.1007/springerreference_213
Differential Power Analysis
Siva Sai Yerubandi (2002)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.6633/IJNS.200711.5(3).08
A Biometric Identity Based Signature Scheme
A. Burnett (2004)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1007/s00779-012-0540-3
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
Da-Zhi Sun (2012)
10.1504/IJTMCC.2014.063273
Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2014)
10.1016/j.jnca.2009.08.001
An efficient biometrics-based remote user authentication scheme using smart cards
C. Li (2010)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA
David von Oheimb (2005)
10.1016/J.CHAOS.2006.05.061
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
M. Khan (2008)
10.1016/j.ins.2013.10.022
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Vanga Odelu (2014)
10.1145/357980.358017
A method for obtaining digital signatures and public-key cryptosystems
R. Rivest (1983)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1007/s10207-004-0055-7
OFMC: A symbolic model checker for security protocols
D. Basin (2004)
10.1007/s10916-014-0016-2
A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems
Zuowen Tan (2014)
10.1155/2012/382810
A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
S. Yoo (2012)
10.1145/1029102.1029113
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
10.1007/978-3-540-24676-3_31
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis (2004)
10.1049/iet-ifs.2010.0125
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
A. K. Das (2011)
10.1109/WIMOB.2010.5645004
Improved two-factor user authentication in wireless sensor networks
B. Vaidya (2010)
10.1007/s10623-005-6344-y
Some Observations on the Theory of Cryptographic Hash Functions
D. Stinson (2001)
10.1007/s10916-013-9948-1
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
A. K. Das (2013)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1007/s10916-013-9969-9
An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
A. K. Das (2013)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1007/s11859-010-0318-2
A biometric-based user authentication for wireless sensor networks
J. Yuan (2010)
10.1145/1880022.1880027
A Simple and Generic Construction of Authenticated Encryption with Associated Data
P. Sarkar (2010)
10.1016/j.jnca.2010.09.003
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
X. Li (2011)
10.1007/s10916-014-0080-7
Combined Spline and B-spline for an Improved Automatic Skin Lesion Segmentation in Dermoscopic Images Using Optimal Color Channel
A. A. Abbas (2014)



This paper is referenced by
10.1007/s11277-016-3676-z
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks
M. Wazid (2017)
10.3390/s20051300
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
Sumit Pundir (2020)
10.3390/s18113663
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
Seyed Farhad Aghili (2018)
10.1002/DAC.4024
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment
M. Wazid (2019)
10.3837/tiis.2016.07.028
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards
Goutham Reddy Alavalapati (2016)
10.1155/2020/5686498
An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems
Jiaqing Mo (2020)
10.1007/S13369-019-03752-7
A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception
Lili Xu (2019)
10.1007/s12083-016-0485-9
An improved and provably secure three-factor user authentication scheme for wireless sensor networks
F. Wu (2018)
10.1109/ACCESS.2018.2827027
Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks
S. Banerjee (2018)
10.1007/s12083-017-0627-8
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
AmirHosein Adavoudi-Jolfaei (2019)
10.1007/978-3-319-48743-4_32
Trust Model of Wireless Sensor Networks Based on Shannon Entropy
J. Hu (2016)
10.1155/2020/5047379
Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks
Jiaqing Mo (2020)
10.1007/S11276-018-1841-X
Lightweight three factor scheme for real-time data access in wireless sensor networks
Hanguang Luo (2020)
10.1016/j.jisa.2016.05.006
Design of a secure smart card-based multi-server authentication scheme
A. Chaturvedi (2016)
10.3390/s18113695
A Lightweight Anonymous Client–Server Authentication Scheme for the Internet of Things Scenario: LAuth
Yuwen Chen (2018)
10.1002/sec.1528
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor
S. H. Islam (2016)
10.1002/sec.1464
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
10.1109/ACCESS.2019.2949649
An Improved Authentication Protocol Using Smart Cards for the Internet of Things
Cao Shou-qi (2019)
10.1051/matecconf/202030902001
A new three-factor authentication scheme overcome repeat registered attack for wireless sensor networks
Ye Li (2020)
10.1109/TIE.2016.2585081
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope (2016)
10.1007/S40860-020-00113-2
Cryptanalysis and improvement of a three-factor user authentication scheme for smart grid environment
Harmanpreet Singh Grover (2020)
10.1007/s11042-017-5560-6
Signature-based three-factor authenticated key exchange for internet of things applications
Xiaoying Jia (2017)
10.1155/2017/6562953
Authentication Protocols for Internet of Things: A Comprehensive Survey
M. Ferrag (2017)
10.1016/j.future.2017.08.042
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
10.1109/TII.2017.2732999
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment
M. Wazid (2017)
10.1007/S13369-018-3220-4
Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System
R. Ali (2018)
Scalable and Low Overhead Watermarking Based Integrated Authentication and Encryption Scheme for Wireless Sensor Networks
T. Gambhir (2017)
10.1002/dac.4194
A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
S. Kumari (2020)
10.1007/s12083-015-0408-1
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
Omid Mir (2017)
10.1109/COMPCOMM.2017.8322568
On the security of a realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks
Ling Xiong (2017)
10.1007/s11227-017-2048-0
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S. Kumari (2018)
10.1109/TII.2019.2963328
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang (2020)
See more
Semantic Scholar Logo Some data provided by SemanticScholar