Online citations, reference lists, and bibliographies.
← Back to Search

Efficient And Security Enhanced Anonymous Authentication With Key Agreement Scheme In Wireless Sensor Networks

J. Jung, Jongho Moon, D. Lee, D. Won
Published 2017 · Computer Science, Medicine

Cite This
Download PDF
Analyze on Scholarcy
Share
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.
This paper references
10.1155/2015/743623
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
Chen-Yang Cheng (2015)
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons
Smart Card with Integrated Fingerprint Reader
P J Baratelli
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1145/74850.74852
A logic of authentication
M. Burrows (1989)
10.1155/2013/730831
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)
Design & Method for Manufacturing Low-Cost Smartcards with Embedded Fingerprint Authentication System Modules
D. Kozlay (2004)
10.1016/j.patcog.2004.04.011
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
A. Teoh (2004)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.3390/s151229767
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
I. Chang (2015)
10.1136/pgmj.46.536.343
Sensors.
H. S. Wolff (1970)
10.1016/j.jnca.2010.03.004
A novel node level security policy framework for wireless sensor networks
W. Claycomb (2011)
10.1371/journal.pone.0145263
An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards
Jongho Moon (2015)
10.3390/s140406443
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
Jiye Kim (2014)
10.3390/s16122123
Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
YoHan Park (2016)
180-1. Secure Hash Standard
P Fips (1995)
10.1002/sec.1432
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
Dongwoo Kang (2016)
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
W. Han (2011)
10.1016/j.future.2016.04.016
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S. Kumari (2016)
Wireless Sensor Network -A Survey
N. Chouhan (2013)
10.1007/s10916-015-0422-0
An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps
Jongho Moon (2015)
10.3390/s141121023
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Junghyun Nam (2014)
10.1007/springerreference_213
Differential Power Analysis
Siva Sai Yerubandi (2002)
10.3390/s150714960
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
Tian-Fu Lee (2015)
10.1109/30.826377
A new remote user authentication scheme using smart cards
M. Hwang (2000)
Cryptography and Network Security - Principles and Practice
T. Si (2015)
10.1002/sec.1452
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
M. Wazid (2016)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1371/journal.pone.0131368
Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’
S. H. Islam (2015)
10.3390/s140610081
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
Two-factor user authentication scheme in wireless sensor networks
M. L. Das (2009)
10.1002/sec.517
Two-factor mutual authentication with key agreement in wireless sensor networks
B. Vaidya (2016)
Smart Card with Integrated Fingerprint Reader. U.S
P. J. Baratelli (2001)
10.1016/j.eswa.2014.07.004
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
Dheerendra Mishra (2014)
10.1016/j.comcom.2007.12.005
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
C. Li (2008)
10.1002/dac.2468
Security flaws in two improved remote user authentication schemes using smart cards
C. Ma (2014)
10.1007/s10916-013-9948-1
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
A. K. Das (2013)
Secure Hash Standard; National Institute of Standards and Technology: Gaithersburg, MD
P FIPS (1995)
180-1. Secure Hash Standard; National Institute of Standards and Technology
Fips P (1995)
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and
Y Choi (2014)
10.1109/JPROC.2003.814918
Sensor networks: evolution, opportunities, and challenges
C. Chong (2003)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
Secure Smartcard-Based Fingerprint Authentication ∗
T. Clancy (2003)
10.1007/BFb0024447
Key Agreement Protocols and Their Security Analysis
S. Blake-Wilson (1997)
10.1145/1029102.1029113
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
10.3390/s16101653
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks
Youngseok Chung (2016)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
Principles and Practices; Pearson Education: Upper Saddle River
W Stallings (2006)
10.1155/2014/281305
Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
Younsung Choi (2014)



This paper is referenced by
10.1109/ACCESS.2020.2987764
An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
Mostafa Farhadi Moghadam (2020)
10.1016/J.ADHOC.2019.101948
Enhanced authentication and key management scheme for securing data transmission in the internet of things
Y. Harbi (2019)
10.5121/ijcnc.2019.11506
A Novel Security Protocol for Wireless Sensor Networks Based on Elliptic Curve Signcryption
A. K. Singh (2019)
10.3390/s19092012
A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes
Sooyeon Shin (2019)
10.1109/ACCESS.2020.2979906
A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
Shuailiang Zhang (2020)
10.1002/DAC.3879
Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN
Pawan Singh Mehra (2019)
10.1109/ICOIN.2018.8343154
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Jongho Moon (2018)
10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00201
Authentication Protocol for Real-Time Wearable Medical Sensor Networks Using Biometrics and Continuous Monitoring
N. Mohsen (2019)
10.1007/s11277-020-07385-0
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
10.1007/S42979-019-0010-3
A Signature-Based Mutual Authentication Protocol for Remote Health Monitoring
S. Binu (2020)
10.3390/s17122946
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Chenyu Wang (2017)
10.1371/journal.pone.0193366
An improved anonymous authentication scheme for roaming in ubiquitous networks
Hakjun Lee (2018)
10.1007/978-981-15-0058-9_33
Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks
Jihyeon Ryu (2020)
10.3390/app10051863
iPatient Privacy Copyright Cloud Management
Y. Kuo (2020)
Three-Factor User Authentication Scheme for WSN
Mercy Jeba Malar (2019)
10.3233/JIFS-179291
Efficient multiplications in finite fields for multivariate signatures
Haibo Yi (2019)
10.3390/s18072394
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography
Guosheng Xu (2018)
10.1109/ICDIM.2017.8244650
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks
Taeui Song (2017)
An Importance of the Authentication Mechanisms in the Networks: A Literature Survey
D. Selvamani (2018)
10.1016/j.comcom.2020.06.012
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
Mengxia Shuai (2020)
10.3390/electronics9050733
Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless Communication
Mijin Kim (2020)
10.1109/ACCESS.2018.2880984
A Robust Authentication Scheme With Continuously Updated Information for Vehicular Sensor Networks
Xin Liu (2018)
10.1109/COMSNETS48256.2020.9027361
An Interoperable ECC based Authentication and Key Agreement Scheme for IoT Environment
A. Sahoo (2020)
10.3390/electronics9091418
An Energy-Efficient Secure Forwarding Scheme for QoS Guarantee in Wireless Sensor Networks
D. Kim (2020)
10.3390/s18010251
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks
L. Roure (2018)
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
10.1145/3325130
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs
Ding Wang (2020)
10.1007/978-981-15-1465-4_34
Cryptanalysis of Kumar et al.’s Authentication Protocol for Wireless Sensor Networks
Sewan Ha (2020)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1155/2018/8539674
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
Wenting Li (2018)
Semantic Scholar Logo Some data provided by SemanticScholar