Online citations, reference lists, and bibliographies.
← Back to Search

A New And Secure Authentication Scheme For Wireless Sensor Networks With Formal Proof

F. Wu, Lili Xu, S. Kumari, X. Li
Published 2017 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Wireless sensor network(WSN) contains many specially distributed sensors which collect information for people to analyze appointed objects in real-time. WSN is deployed widely in many fields, such as fire detection and remote health care monitoring. User authentication is an important part for the communication of WSN. In 2014, Jiang et al. and Choi et al. proposed their authentication schemes for WSN, respectively. However, we find some weaknesses in them. Jiang et al.’s scheme cannot resist the De-Synchronization attack, the off-line guessing attack and the user forgery attack. Besides, it does not keep the character of strong forward security. Choi et al.’s scheme is under the off-line password guessing attack and the user impersonation attack without user anonymity. We present an improved authentication scheme and prove it to be secure with the formal security model. Also, we analyze the concrete secure characters and the performance of our scheme. Through comparison with some recent schemes, our scheme is more practical and fit for applications.
This paper references
Cryptography and Network Security - Principles and Practice
T. Si (2015)
10.1007/3-540-48405-1_25
Differential Power Analysis
Paul C. Kocher (1999)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
Cryptography and Network Security: Principles and Practice
W. Stallings (1998)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1109/WIMOB.2010.5645004
Improved two-factor user authentication in wireless sensor networks
B. Vaidya (2010)
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
W. Han (2011)
10.1155/2013/858579
Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
Shin-Yan Chiou (2013)
10.1145/948109.948142
Security proofs for an efficient password-based key exchange
Emmanuel Bresson (2003)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1007/s12083-014-0285-z
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.1007/s00530-013-0346-9
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D. He (2013)
10.1155/2013/730831
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)
10.1007/s00779-012-0540-3
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
Da-Zhi Sun (2012)
10.1007/978-3-540-89641-8_10
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
M. Abdalla (2008)
10.1049/IET-IFS.2010.0096
One for all - all for one: unifying standard differential power analysis attacks
S. Mangard (2011)
10.1145/1029102.1029113
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
10.3390/s140610081
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
10.1002/sec.977
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
Lili Xu (2015)
10.1007/978-3-642-35404-5
Cryptology and Network Security
Josef Pieprzyk (2012)
10.1155/2012/382810
A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
S. Yoo (2012)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
An efficient and dosresistant user authentication scheme for two - tiered wireless sensor networks
W Han (2011)
10.1007/s10916-014-0179-x
Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care
Lili Xu (2014)
10.1016/j.adhoc.2014.11.018
User authentication schemes for wireless sensor networks: A review
S. Kumari (2015)
10.1201/9781439821916
Handbook of Applied Cryptography
A. Menezes (1996)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1109/TIE.2012.2218562
Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks
Daojing He (2013)
10.1631/jzus.C1000377
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong Fan (2011)
10.1016/j.compeleceng.2015.02.015
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks
F. Wu (2015)
10.1016/j.adhoc.2014.03.003
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
Ding Wang (2014)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)



This paper is referenced by
10.1002/sec.1551
A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks
Lili Xu (2016)
10.1155/2018/2484268
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
Ke Zhang (2018)
10.1155/2019/2136506
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
Jiaqing Mo (2019)
10.1109/JSYST.2019.2899580
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems
X. Li (2020)
10.1016/j.cose.2019.101619
Understanding security failures of multi-factor authentication schemes for multi-server environments
Ding Wang (2020)
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT
Seyed Farhad Aghili (2020)
10.1007/S11277-020-07811-3
Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
A. Jabbari (2020)
10.1002/DAC.3767
On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS
Jianghong Wei (2018)
10.1002/sec.1558
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
F. Wu (2016)
10.1109/TII.2019.2963328
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang (2020)
10.3390/electronics8111299
A Trust Framework to Detect Malicious Nodes in Cognitive Radio Networks
Geetanjali Rathee (2019)
10.3390/s18113695
A Lightweight Anonymous Client–Server Authentication Scheme for the Internet of Things Scenario: LAuth
Yuwen Chen (2018)
10.1007/S11277-019-06357-3
Secure and Trust-Aware Routing Scheme in Wireless Sensor Networks
Azam Beheshtiasl (2019)
10.1002/DAC.4103
SEBAP: A secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing
V. Kumar (2019)
10.1016/j.vehcom.2019.100213
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
Vinod Kumar (2020)
10.1007/s12652-020-02465-2
On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments
Morteza Adeli (2020)
10.1016/j.cose.2018.05.006
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
L. Malina (2018)
10.1145/3341325.3342039
User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT
M. Ak̲h̲tar (2019)
10.1007/s11277-020-07385-0
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
10.1007/s11276-020-02451-8
User-sensor mutual authenticated key establishment scheme for critical applications in wireless sensor networks
A. Jabbari (2020)
10.1155/2019/5935292
A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function
Jin Wook Byun (2019)
10.1109/JSYST.2018.2866067
Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
Y. K. Ever (2019)
10.1002/sec.1464
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
10.1016/j.future.2017.08.042
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
10.4018/IJACI.2019010106
A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks
Preeti Chandrakar (2019)
10.1109/CITS49457.2020.9232622
An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps
Chandrashekhar Meshram (2020)
10.1007/s10916-018-0987-5
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing
V. Kumar (2018)
10.1177/1550147719879379
Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things
B. Yu (2019)
10.1007/S13369-019-03752-7
A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception
Lili Xu (2019)
10.3390/s17122946
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Chenyu Wang (2017)
Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
Yoney Kirsal Ever (2019)
10.1080/1206212X.2020.1825159
Cryptanalysis and improvement of mutual authentication protocol for real-time data access in industrial wireless sensor networks
Devender Kumar (2020)
See more
Semantic Scholar Logo Some data provided by SemanticScholar