Online citations, reference lists, and bibliographies.
← Back to Search

Measuring Two-Factor Authentication Schemes For Real-Time Data Access In Industrial Wireless Sensor Networks

Ding Wang, Wenting Li, P. Wang
Published 2018 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Dozens of two-factor authentication schemes have been proposed to secure real-time data access in industrial wireless sensor networks (WSNs). However, more often than not, the protocol designers advocate the merits of their scheme, but do not reveal (or unconsciously ignoring) the facets on which their scheme performs poorly. Such lack of an objective, comprehensive measurement leads to the unsatisfactory “break-fix-break-fix” cycle in this research area. In this paper, we make an attempt toward breaking this undesirable cycle by proposing a systematical evaluation framework for schemes to be assessed objectively, revisiting two foremost schemes proposed by Wu et al. (2017) and Srinivas et al. (2017) to reveal the challenges and difficulties in designing a sound scheme, and conducting a measurement of 44 representative schemes under our evaluation framework, thereby providing the missing evaluation for two-factor schemes in industrial WSNs. This work would help increase awareness of current measurement issues and improve the scientific process in our field.
This paper references
10.3390/s17122946
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Chenyu Wang (2017)
10.1109/TIFS.2018.2866304
Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model"
Xiaowei Li (2019)
10.3390/s140610081
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
10.1016/j.adhoc.2014.03.003
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
Ding Wang (2014)
10.1109/TCE.2010.5505971
On the security of an enhanced novel access control protocol for wireless sensor networks
P. Zeng (2010)
10.1117/12.586976
Feature-based watermarking of 3D objects: toward robustness against remeshing and desynchronization
Patrice Rondao-Alface (2005)
10.1524/itit.2010.0609
Attacker Models for Wireless Sensor Networks
Zinaida Benenson (2010)
10.1016/j.jnca.2017.07.001
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X. Li (2018)
10.1145/2897845.2897916
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
Ding Wang (2016)
10.1109/JIOT.2017.2780232
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
10.1016/j.jpdc.2017.08.007
Efficient and secure searchable encryption protocol for cloud-based Internet of Things
Libing Wu (2018)
10.1016/j.comnet.2016.01.006
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
A temporal - credential - basedmutual 893 authentication and key agreement scheme for wireless sensor networks , ” 894
C.-C. Lee
Novel anonymous authentication 1005 scheme using smart cards
B. B. Macq
10.1016/j.ins.2015.03.070
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Ding Wang (2015)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1109/WIMOB.2010.5645004
Improved two-factor user authentication in wireless sensor networks
B. Vaidya (2010)
A temporal - credential - basedmutual 934 authentication and key agreement scheme for wireless sensor networks
J. Ma
Reverse - engineering a 994 cryptographic RFID tag . ” in
S. Starbug (2008)
10.3390/s16060837
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
Y. Lu (2016)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.1007/978-3-319-62024-4_3
A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks
X. Li (2016)
10.1109/ACCESS.2017.2673239
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Q. Jiang (2017)
10.1007/s12083-015-0404-5
A new and secure authentication scheme for wireless sensor networks with formal proof
F. Wu (2017)
Efficient and secure search - 851 able encryption protocol for cloud - based internet of things
C.-H. Chu
10.1007/s10916-014-0042-0
A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System
F. Wen (2014)
10.3390/s140406443
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
Jiye Kim (2014)
10.1007/s00779-012-0540-3
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
Da-Zhi Sun (2012)
10.1109/TDSC.2016.2616876
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
S. Chatterjee (2018)
10.1016/j.ins.2015.02.010
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
A secure user 1024 authentication and key - agreement scheme using wireless sensor networks 1025 for agriculture monitoring
S. Kumari
10.1109/MSP.2017.2697179
How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]
N. Memon (2017)
10.1155/2013/407971
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
O. Althobaiti (2013)
10.1016/j.future.2017.06.018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
R. Ali (2018)
10.1016/j.tcs.2005.11.038
Security analysis of a password-based authentication protocol proposed to IEEE 1363
Z. Zhao (2006)
10.1016/j.comnet.2014.07.010
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang (2014)
An energy efficient mutual authentica - 1047 tion and key agreement scheme preserving anonymity for wireless sensor 1048 networks
S. Kumari
Real - time wireless sensor - actuator networks for industrial 842 cyber - physical systems
K.-K. R. Choo
10.1016/j.future.2016.05.032
A robust and anonymous patient monitoring system using wireless medical sensor networks
R. Amin (2018)
10.1016/j.adhoc.2015.05.020
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
R. Amin (2016)
Ruasn : 1068 A robust user authentication framework for wireless sensor networks
H.-L. Yeh
10.1631/jzus.C1000377
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong Fan (2011)
10.3390/s17030644
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
J. Jung (2017)
10.1109/GLOCOM.2007.190
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
Huei-Ru Tseng (2007)
10.1016/j.pmcj.2016.10.003
Mobile security and privacy: Advances, challenges and future research directions
Kim-Kwang Raymond Choo (2016)
On the security of an enhanced 845 novel access control protocol for wireless sensor networks
L. Rokach
10.1145/2976749.2978339
Targeted Online Password Guessing: An Underestimated Threat
Ding Wang (2016)
A dynamic user authentica - 953 tion scheme for wireless sensor networks
R.-H. Jan H.-R. Tseng
10.1007/978-3-319-27659-5_16
Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards
Ding Wang (2013)
Provably se - 1082 cure dynamic id - based anonymous two - factor authenticated key exchange 1083 protocol with extended security model
S. Roy Chatterjee
10.1145/3078240
Unsupervised Residential Power Usage Monitoring Using a Wireless Sensor Network
Rui Tan (2017)
10.3390/s120201625
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
P. Kumar (2012)
Provably 1050 secure user authentication and key agreement scheme for wireless sensor 1051 networks
D. Makrakis Vaidya
10.1016/j.jcss.2005.10.001
A password authentication scheme over insecure networks
I. Liao (2006)
10.1109/TDSC.2016.2605087
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
Ding Wang (2018)
10.1007/s10916-012-9839-x
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
Tsung-Chih Hsiao (2012)
10.1016/j.adhoc.2015.05.014
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
10.1109/TDSC.2015.2490064
Security Analysis of Password-Authenticated Key Retrieval
SeongHan Shin (2017)
Two-factor mutual authentication with key agreement in wireless sensor networks
VaidyaBinod (2016)
10.3390/s110505020
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
P. Kumar (2011)
10.1109/tifs.2017.2659640
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
Q. Xie (2017)
Security analysis and 890 improvements of two - factor mutual authentication with key agreement in 891 wireless sensor networks
C. Ma
Efficient and security enhanced 1021 anonymous authentication with key agreement scheme in wireless sensor 1022 networks
A. K. Pal
10.1016/j.jnca.2012.01.007
Dynamic ID-based remote user password authentication schemes using smart cards: A review
R. Madhusudhan (2012)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1007/978-3-319-23829-6_11
On the Usability of Two-Factor Authentication
Ding Wang (2014)
An efficient biomet - 1062 ric authentication protocol for wireless sensor networks
T.-C. Hsiao
10.1016/j.adhoc.2014.11.018
User authentication schemes for wireless sensor networks: A review
S. Kumari (2015)
10.1109/TWC.2015.2473165
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
A temporal - credential - basedmutual authentication and key agreement scheme for wireless sensor networks
J. Ma
10.1109/JPROC.2015.2497161
Real-Time Wireless Sensor-Actuator Networks for Industrial Cyber-Physical Systems
Chenyang Lu (2016)
10.1109/TII.2016.2575800
Self-Adaptive Data Collection and Fusion for Health Monitoring Based on Body Sensor Networks
Carol Habib (2016)
Zipf ’ s law in 971 passwords
E.-O. Blaß Z. Benenson
10.1002/sec.1573
Provably secure user authentication and key agreement scheme for wireless sensor networks
A. K. Das (2016)
An 1065 authentication scheme to healthcare security under wireless sensor net - 1066 works
A. J. Choudhury
10.1109/TII.2012.2230639
Novel Anonymous Authentication Scheme Using Smart Cards
Jia-Lun Tsai (2013)
10.1109/TII.2015.2436337
A Real-Time Big Data Gathering Algorithm Based on Indoor Wireless Sensor Networks for Risk Analysis of Industrial Operations
Xuejun Ding (2016)
10.1007/s11859-010-0318-2
A biometric-based user authentication for wireless sensor networks
J. Yuan (2010)
10.1109/ALLERTON.2008.4797699
Modeling node capture attacks in wireless sensor networks
P. Tague (2008)
10.1016/j.future.2017.08.042
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1002/dac.2933
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
A. K. Das (2017)
Design 1041 of secure user authenticated key management protocol for generic iot 1042 networks
S. Kalra
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
10.1109/TIFS.2017.2721359
Zipf’s Law in Passwords
Ding Wang (2017)
Un - 832 supervised residential power usage monitoring using a wireless sensor 833 network
A. Makhoul Habib
10.1016/j.jnca.2016.10.001
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Qi Jiang (2016)
10.1007/s12083-014-0285-z
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)
10.1016/j.elerap.2011.03.001
Across-authority lightweight ownership transfer protocol
Ming-Hour Yang (2011)
10.1016/j.adhoc.2014.03.009
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
10.1109/TIE.2016.2585081
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope (2016)
10.1002/dac.2468
Security flaws in two improved remote user authentication schemes using smart cards
C. Ma (2014)
10.1016/j.jnca.2016.12.008
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F. Wu (2017)
10.1109/TPDS.2013.230
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems
Xinyi Huang (2014)
Phoenix: Rebirth of a Cryptographic Password-Hardening Service
R. F. Lai (2017)
10.1007/978-3-642-22792-9_20
Generic Side-Channel Distinguishers: Improvements and Limitations
Nicolas Veyrat-Charvillon (2011)
A lightweight anony - 1038 mous authentication protocol with perfect forward secrecy for wireless 1039 sensor networks
A. K. Das Wazid
10.1109/TII.2017.2687618
Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System
Haiping Huang (2017)
10.1002/dac.3323
Secure multi-factor remote user authentication scheme for Internet of Things environments
P. Dhillon (2017)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
A secured 1071 authentication protocol for wireless sensor networks using elliptic curves 1072 cryptography
Y. Gao
On the security and 930 improvement of a two - factor user authentication scheme in wire - 931 less sensor networks
C. Ma
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
An untraceable 937 temporal - credential - based two - factor authentication scheme using ecc for 938 wireless sensor networks
S. Mukhopadhyay
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1109/TDSC.2014.2355850
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang (2015)
10.1002/sec.517
Two-factor mutual authentication with key agreement in wireless sensor networks
B. Vaidya (2016)
10.1016/j.jcss.2008.04.002
Two-factor mutual authentication based on smart cards and passwords
G. Yang (2008)
10.3390/s17112681
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
Ling Xiong (2017)
10.1016/j.adhoc.2016.11.002
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks
J. Srinivas (2017)



This paper is referenced by
10.1002/ett.3925
Fuzzy vault‐based three‐factor authentication and key exchange for 5G‐integrated wireless sensor networks
Junshuai Sun (2020)
10.1109/JIOT.2019.2904177
Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices
Qi Jiang (2019)
10.1049/iet-ifs.2019.0491
Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs
Mengxia Shuai (2020)
10.1109/icccnt45670.2019.8944674
Cryptanalysis of ecc-based key agreement scheme for generic IoT network model
C. Patel (2019)
10.3390/s19030480
An Adversarial-Risk-Analysis Approach to Counterterrorist Online Surveillance
César Gil (2019)
10.1109/TII.2019.2895030
Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
Prosanta Gope (2019)
10.1177/1550147719879379
Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things
B. Yu (2019)
10.1109/ACCESS.2020.3000790
On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks
Joonyoung Lee (2020)
10.1016/j.future.2019.12.028
Securing internet of medical things systems: Limitations, issues and recommendations
Jean-Paul A. Yaacoub (2020)
10.1109/JSYST.2019.2896064
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
Xiaoying Jia (2020)
10.1109/JSYST.2019.2933464
Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC
Siranjeevi Rajamanickam (2020)
10.1109/TII.2020.2972623
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things
Jiannan Wei (2021)
10.3390/s19194130
True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing
Kyungroul Lee (2019)
10.1109/TII.2019.2948053
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks
Q. Feng (2020)
10.1016/j.cmpb.2019.105054
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system
P. Soni (2019)
10.1080/1206212X.2020.1825159
Cryptanalysis and improvement of mutual authentication protocol for real-time data access in industrial wireless sensor networks
Devender Kumar (2020)
10.1007/978-981-15-3914-5_17
A Novel Lightweight Authentication for Intelligent Energy Monitoring in Smart Home
C. Patel (2020)
10.1155/2018/3048697
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment
Chenyu Wang (2018)
10.1109/ACCESS.2020.3010302
Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0
Gurjot Singh Gaba (2020)
10.1016/j.jisa.2020.102499
Efficient and privacy-preserving authentication scheme for wireless body area networks
Mengxia Shuai (2020)
10.3390/electronics9030458
Enabling Location Privacy Preservation in MANETs Based on Distance, Angle, and Spatial Cloaking
N. Jiang (2020)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1007/s12243-020-00765-4
An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion
Fan Wu (2020)
10.1109/JSYST.2019.2899580
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems
X. Li (2020)
10.3390/s19163598
A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
Sungjin Yu (2019)
10.1117/12.2513804
Securing critical infrastructures with location based authentication blockchain
Michael A. Noble (2019)
10.1155/2018/5823439
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices
Xiang Yu (2018)
10.1155/2020/8818704
Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems
Hui Zhang (2020)
10.1109/ACCESS.2019.2948091
JSSA: Joint Sidelobe Suppression Approach for Collaborative Beamforming in Wireless Sensor Networks
S. Liang (2019)
10.1155/2020/8853468
Automated Fraudulent Phone Call Recognition through Deep Learning
Jian Xing (2020)
10.1007/978-3-030-12330-7_12
Security and Privacy Techniques for the Industrial Internet of Things
Y. Zhang (2019)
10.1016/j.adhoc.2020.102096
Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
Zahrah A. Almusaylim (2020)
See more
Semantic Scholar Logo Some data provided by SemanticScholar