Online citations, reference lists, and bibliographies.
← Back to Search

A Provably Secure, Efficient, And Flexible Authentication Scheme For Ad Hoc Wireless Sensor Networks

C. Chang, Hai-Duong Le
Published 2016 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
In 2014, Turkanovic et al. proposed a smart card-based authentication scheme for heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it employs only hash function and XOR operation. However, we found that Turkanovic et al.'s scheme is vulnerable to impersonation attack with node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy. We propose an efficient scheme to overcome all those weaknesses. Moreover, we also propose an advanced scheme, which provides perfect forward secrecy without much modification from the first proposed scheme.
This paper references
10.3390/s140610081
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.1109/WIMOB.2010.5645004
Improved two-factor user authentication in wireless sensor networks
B. Vaidya (2010)
10.5755/J01.EEE.19.6.2038
An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
Muhamed Turkanovic (2013)
10.6633/IJNS.200809.7(2).08
A Simple User Authentication Scheme for Grid Computing
R. Lu (2008)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1155/2014/325734
Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks
Qi Xie (2014)
10.1049/IP-IFS:20055073
Password-Based Authenticated Key Exchange in the Three-Party Setting
M. Abdalla (2004)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1155/2013/730831
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1145/168588.168596
Random oracles are practical: a paradigm for designing efficient protocols
M. Bellare (1993)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1016/j.adhoc.2014.03.009
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
10.1007/978-3-540-45146-4_7
Scalable Protocols for Authenticated Group Key Exchange
Jonathan Katz (2003)
10.1109/GLOCOM.2007.190
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
Huei-Ru Tseng (2007)



This paper is referenced by
10.1109/JIOT.2019.2931372
Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
Saurav Malani (2019)
10.3390/s20185166
MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things
Karanjeet Choudhary (2020)
10.1109/CITS49457.2020.9232633
A Secure Authentication Mechanism for Wireless Sensor Networks
R. Ali (2020)
10.1007/s11227-020-03318-7
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography
Dipanwita Sadhukhan (2020)
10.1007/s12652-017-0460-1
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
S. Kumari (2018)
10.1109/TVT.2020.3000576
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
Basudeb Bera (2020)
10.1109/ICCSN49894.2020.9139051
Authentication and Capability-based Access Control: An Integrated Approach for IoT Environment
N. Sivaselvan (2020)
10.1016/j.pmcj.2020.101177
Secure and anonymous authentication scheme for the Internet of Things with pairing
H. Wu (2020)
10.1007/s11227-016-1948-8
Attribute-based authentication on the cloud for thin clients
M. Ibrahim (2016)
10.1007/S12652-020-02532-8
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
Devender Kumar (2020)
10.1145/3325130
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs
Ding Wang (2020)
10.1109/JIOT.2019.2923373
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
S. Banerjee (2019)
10.1145/3303704
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs
Z. Yang (2019)
10.3970/cmc.2018.903.694
EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack
Yong Xie (2019)
10.1109/ACCESS.2017.2723265
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
M. Wazid (2017)
10.1109/JIOT.2017.2780232
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
10.1109/ACCESS.2017.2777840
Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices
Vanga Odelu (2017)
10.1109/ACCESS.2019.2930542
A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map
Feifei Wang (2019)
10.1109/ACCESS.2019.2947723
Review on Security of Internet of Things Authentication Mechanism
Tarak Nandy (2019)
10.1002/ett.3995
Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment
Sourav Saha (2020)
10.1155/2018/8539674
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
Wenting Li (2018)
10.1007/s12652-017-0474-8
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
J. Srinivas (2018)
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
Behnam Zahednejad (2018)
10.1371/journal.pone.0232277
Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
Chi-Tung Chen (2020)
10.1016/j.jnca.2017.12.012
An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks
R. Amin (2018)
10.1049/iet-spr.2016.0378
Physical layer spoofing detection based on sparse signal processing and fuzzy recognition
N. Wang (2017)
10.1109/JBHI.2017.2753464
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
A. K. Das (2018)
10.3390/s18113663
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
Seyed Farhad Aghili (2018)
10.1109/ACCESS.2017.2773535
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
Kisung Park (2017)
10.1016/j.comnet.2020.107335
Design of secure authentication protocol for dynamic user addition in distributed Internet-of-Things
Hiral S. Trivedi (2020)
10.1007/s10207-019-00484-5
Lightweight multi-factor mutual authentication protocol for IoT devices
Reem Melki (2019)
10.1007/s12652-018-0716-4
A Privacy Preserving three-factor authenticated key agreement protocol for client–server environment
Goutham Reddy Alavalapati (2019)
See more
Semantic Scholar Logo Some data provided by SemanticScholar