Online citations, reference lists, and bibliographies.
← Back to Search

A Secure Temporal-credential-based Mutual Authentication And Key Agreement Scheme With Pseudo Identity For Wireless Sensor Networks

D. He, N. Kumar, N. Chilamkurti
Published 2015 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
With an advancement of wireless communication technology, wireless sensor network (WSN) has emerged as one of the most powerful technologies which can be used in various applications, such as military surveillance, environment monitoring, industrial control, and medical monitoring. WSNs are vulnerable to large collection of attacks than traditional networks because they transmit data using a wireless channel and are deployed in unattended environments. So, in this environment, how to ensure secure communications between different communication parties becomes a challenging issue with respect to the constraints of energy consumption, and large overhead generated during various operations performed. In this direction, the mutual authentication and key agreement (MAAKA) scheme attracts much attention in recent years. In literature, MAAKA schemes were presented in last several years. However, most of these schemes cannot satisfy security requirements in WSNs. Recently, Xue et al. proposed a temporal-credential-based MAAKA scheme for WSNs and proved that it could withstand various types of attacks. However, this paper points out that Xue et al.'s MAAKA scheme is vulnerable to the off-line password guessing attack, the user impersonation attack, the sensor node impersonation attack and the modification attack. Moreover, this paper also points out that Xue et al.'s MAAKA scheme cannot provide user anonymity. To overcome weaknesses in Xue et al.'s MAAKA scheme, this paper proposes a new temporal-credential-based MAAKA scheme for WSNs. Security analysis shows the proposed MAAKA scheme could overcome the weaknesses in Xue et al.'s MAAKA scheme. Performance analysis shows the proposed MAAKA scheme has better performance than the existing benchmarked schemes in literature. Therefore, the proposed MAAKA scheme is more suitable for providing security for various applications in WSNs.
This paper references
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
D. He (2015)
An enhanced two-factor user authentication in wireless sensor networks
J. Yuan (2014)
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
B. Vaidya (2010)
User Authentication in Sensor Networks
Zinaida Benenson (2004)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D. He (2013)
Sensor networks: evolution, opportunities, and challenges
C. Chong (2003)
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
Huei-Ru Tseng (2007)
Enhanced three-factor security protocol for consumer USB mass storage devices
D. He (2014)
Simple Dynamic User Authentication Protocols for Wireless Sensor Networks
T. Lee (2008)
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
A novel dynamic user authentication scheme for wireless sensor networks
Lee-Chun Ko (2008)
A logic of authentication
M. Burrows (1990)
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
Realizing Robust User Authentication in Sensor Networks
Zinaida Benenson (2005)
Differential Power Analysis
Paul C. Kocher (1999)
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
D. He (2014)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
Robust dynamic user authentication scheme for wireless sensor networks
B. Vaidya (2009)
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)

This paper is referenced by
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
Omid Mir (2017)
Adequate Sparse Secure and Minkowski Distance Based Location Privacy Approach in Wireless Sensor Network
U. Meena (2017)
A novel node authentication protocol connected with ECC for heterogeneous network
P. Chilveri (2020)
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
Devender Kumar (2019)
Efficient certificateless access control for industrial Internet of Things
F. Li (2017)
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security
X. Li (2016)
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
A. Irshad (2016)
NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks †
Anas Ibrahim (2020)
A secure biometric based multi-server authentication scheme for social multimedia networks
Shehzad Ashraf Chaudhry (2015)
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
W. Tai (2019)
Path Loss Algorithms for Data Resilience in Wireless Body Area Networks for Healthcare Framework
A. Sari (2018)
A robust and anonymous patient monitoring system using wireless medical sensor networks
R. Amin (2018)
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Chenyu Wang (2017)
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety
Chunhua Jin (2015)
Fuzzy vault‐based three‐factor authentication and key exchange for 5G‐integrated wireless sensor networks
Junshuai Sun (2020)
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
Ding Wang (2018)
Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing
Wenting Li (2019)
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
L. Zhang (2016)
Breaking Two Remote User Authentication Systems for Mobile Devices
W. Li (2017)
Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks
Fushan Wei (2016)
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography
Guosheng Xu (2018)
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography
R. Amin (2015)
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
Shehzad Ashraf Chaudhry (2016)
Review on Security of Internet of Things Authentication Mechanism
Tarak Nandy (2019)
An Efficient and Secure Authentication Scheme for Wireless Body Area Networks
G. Anusya (2018)
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems
R. Amin (2015)
Design and Analysis of a Provably Secure Multi-server Authentication Scheme
Dheerendra Mishra (2016)
A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems
Omid Mir (2015)
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
Chun-Ta Li (2016)
An improved smart card based authentication scheme for session initiation protocol
S. Kumari (2017)
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System
C. Li (2016)
See more
Semantic Scholar Logo Some data provided by SemanticScholar