Online citations, reference lists, and bibliographies.
← Back to Search

An Advanced Temporal Credential-Based Security Scheme With Mutual Authentication And Key Agreement For Wireless Sensor Networks

C. Li, Chi-Yao Weng, C. Lee
Published 2013 · Computer Science, Medicine

Cite This
Download PDF
Analyze on Scholarcy
Share
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.
This paper references
10.1007/s12652-011-0051-5
A cyber-physical approach to secret key generation in smart environments
P. Barsocchi (2013)
A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS
C. Li (2011)
10.1016/j.adhoc.2011.12.008
Practical and secure localization and key distribution for wireless sensor networks
Q. Mi (2012)
A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks
Mehran Asadi (2013)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1016/j.ins.2011.07.014
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
C. Li (2011)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks
A. K. Das (2012)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
10.1007/978-3-642-16917-5_8
AmbiSec: Securing Smart Spaces Using Entropy Harvesting
P. Barsocchi (2010)
10.5755/j01.itc.40.2.431
Secure Smart Card Based Password Authentication Scheme with User Anonymity
C. Li (2011)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1016/j.jnca.2009.08.001
An efficient biometrics-based remote user authentication scheme using smart cards
C. Li (2010)
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license
A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks
H. Jie (2012)
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks
Kyusuk Han (2012)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1016/j.adhoc.2010.07.007
Computationally efficient mutual entity authentication in wireless sensor networks
Z. Li (2011)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1049/iet-ifs.2012.0058
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
C. Li (2013)
Two-factor user authentication scheme in wireless sensor networks
M. L. Das (2009)
10.1016/j.adhoc.2010.08.020
A light-weight authentication scheme for wireless sensor networks
Oscar Delgado-Mohatar (2011)
10.1016/j.mcm.2011.01.010
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
C. Li (2012)
10.3837/tiis.2013.01.008
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity
C. Li (2013)
An Efficient Password Authentication Scheme for Smart Card
R. Ramasamy (2012)
10.1166/SL.2013.2669
An Improved Two-Factor User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography
C. Li (2013)
10.5755/j01.itc.41.1.1024
A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications
C. Li (2012)
Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks
A. Poornima (2013)



This paper is referenced by
10.3390/s16081299
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks
J. Jung (2016)
10.3390/s150714960
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
Tian-Fu Lee (2015)
10.1142/S0219477516500085
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange
Elias Gonzalez (2015)
10.1007/978-981-10-7635-0_9
Lightweight Anonymity-Preserving Authentication and Key Agreement Protocol for the Internet of Things Environment
Ahmed Mohammed Ibrahim Alkuhlani (2017)
10.1109/JSEN.2016.2628413
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
Prosanta Gope (2017)
10.1109/ISCISC.2017.8488371
Lightweight and Secure Authentication Protocol for the Internet of Things in Vehicular Systems
Sima Arasteh (2017)
10.1002/sec.1573
Provably secure user authentication and key agreement scheme for wireless sensor networks
A. K. Das (2016)
10.1109/ECBIOS.2019.8807841
A Novel Authentication Scheme Against Node Captured Attack in WSN for Healthcare Scene
Sheng-Kai Yang (2019)
10.1016/j.is.2019.101423
Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks
I. Santos-González (2020)
Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Apurva J. Shastri (2017)
10.1016/j.comnet.2016.01.006
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
10.1145/3341325.3342039
User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT
M. Ak̲h̲tar (2019)
10.1109/EAIT.2014.23
A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSN
M. Sarvabhatla (2014)
10.1007/s12046-020-1319-2
A secure authentication framework for WSN-based safety monitoring in coal mines
Aman Ahmad Ansari (2020)
10.3390/s151229767
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
I. Chang (2015)
10.3390/s17122946
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Chenyu Wang (2017)
10.1002/DAC.3879
Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN
Pawan Singh Mehra (2019)
10.3837/tiis.2017.11.021
An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks
J. Li (2017)
AN EFFICIENT USER AUTHENTICATICATION SCHEME FOR MULTIPLE ACCESSES SCENARIO IN WSN BASED IN IOT NOTION
Sheng-kai Yang (2019)
10.1016/J.FUTURE.2019.04.019
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
Arezou Ostad-Sharif (2019)
10.1109/ACCESS.2018.2884541
Registration Center Based User Authentication Scheme for Smart E-Governance Applications in Smart Cities
Saud S. Alotaibi (2019)
10.1016/J.ADHOC.2019.101965
A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks
H. Guo (2019)
10.3390/s140406443
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
Jiye Kim (2014)
10.1007/S12652-020-02532-8
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
Devender Kumar (2020)
10.1007/s00500-017-2504-z
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
C. Li (2018)
10.1007/s11277-015-2621-x
Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems
B. D. Deebak (2016)
10.1016/j.future.2017.08.042
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
Three-Factor User Authentication Scheme for WSN
Mercy Jeba Malar (2019)
10.1109/JEEIT.2019.8717529
A Survey of Authenticated Key Agreement Protocols for Securing IoT
Z. Mohammad (2019)
10.1109/JSEN.2019.2931932
Lightweight Identity-Based Group Key Agreements Using Extended Chaotic Maps for Wireless Sensor Networks
Tian-Fu Lee (2019)
10.1002/sec.1464
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
See more
Semantic Scholar Logo Some data provided by SemanticScholar