Online citations, reference lists, and bibliographies.
← Back to Search

Efficient And Security Enhanced Anonymous Authentication With Key Agreement Scheme In Wireless Sensor Networks

J. Jung, Jongho Moon, D. Lee, D. Won
Published 2017 · Computer Science, Medicine

Cite This
Download PDF
Analyze on Scholarcy
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.
This paper references
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
Chen-Yang Cheng (2015)
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons
Smart Card with Integrated Fingerprint Reader
P J Baratelli
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
A logic of authentication
M. Burrows (1989)
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)
Design & Method for Manufacturing Low-Cost Smartcards with Embedded Fingerprint Authentication System Modules
D. Kozlay (2004)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
A. Teoh (2004)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
I. Chang (2015)
H. S. Wolff (1970)
A novel node level security policy framework for wireless sensor networks
W. Claycomb (2011)
An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards
Jongho Moon (2015)
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
Jiye Kim (2014)
Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
YoHan Park (2016)
180-1. Secure Hash Standard
P Fips (1995)
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
Dongwoo Kang (2016)
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
W. Han (2011)
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S. Kumari (2016)
Wireless Sensor Network -A Survey
N. Chouhan (2013)
An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps
Jongho Moon (2015)
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Junghyun Nam (2014)
Differential Power Analysis
Siva Sai Yerubandi (2002)
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
Tian-Fu Lee (2015)
A new remote user authentication scheme using smart cards
M. Hwang (2000)
Cryptography and Network Security - Principles and Practice
T. Si (2015)
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
M. Wazid (2016)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’
S. H. Islam (2015)
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
Two-factor user authentication scheme in wireless sensor networks
M. L. Das (2009)
Two-factor mutual authentication with key agreement in wireless sensor networks
B. Vaidya (2016)
Smart Card with Integrated Fingerprint Reader. U.S
P. J. Baratelli (2001)
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
Dheerendra Mishra (2014)
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
C. Li (2008)
Security flaws in two improved remote user authentication schemes using smart cards
C. Ma (2014)
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
A. K. Das (2013)
Secure Hash Standard; National Institute of Standards and Technology: Gaithersburg, MD
P FIPS (1995)
180-1. Secure Hash Standard; National Institute of Standards and Technology
Fips P (1995)
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and
Y Choi (2014)
Sensor networks: evolution, opportunities, and challenges
C. Chong (2003)
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
Secure Smartcard-Based Fingerprint Authentication ∗
T. Clancy (2003)
Key Agreement Protocols and Their Security Analysis
S. Blake-Wilson (1997)
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks
Youngseok Chung (2016)
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
Principles and Practices; Pearson Education: Upper Saddle River
W Stallings (2006)
Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
Younsung Choi (2014)

This paper is referenced by
An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
Mostafa Farhadi Moghadam (2020)
Enhanced authentication and key management scheme for securing data transmission in the internet of things
Y. Harbi (2019)
A Novel Security Protocol for Wireless Sensor Networks Based on Elliptic Curve Signcryption
A. K. Singh (2019)
A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes
Sooyeon Shin (2019)
A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
Shuailiang Zhang (2020)
Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN
Pawan Singh Mehra (2019)
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Jongho Moon (2018)
Authentication Protocol for Real-Time Wearable Medical Sensor Networks Using Biometrics and Continuous Monitoring
N. Mohsen (2019)
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
A Signature-Based Mutual Authentication Protocol for Remote Health Monitoring
S. Binu (2020)
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Chenyu Wang (2017)
An improved anonymous authentication scheme for roaming in ubiquitous networks
Hakjun Lee (2018)
Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks
Jihyeon Ryu (2020)
iPatient Privacy Copyright Cloud Management
Y. Kuo (2020)
Three-Factor User Authentication Scheme for WSN
Mercy Jeba Malar (2019)
Efficient multiplications in finite fields for multivariate signatures
Haibo Yi (2019)
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography
Guosheng Xu (2018)
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks
Taeui Song (2017)
An Importance of the Authentication Mechanisms in the Networks: A Literature Survey
D. Selvamani (2018)
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
Mengxia Shuai (2020)
Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless Communication
Mijin Kim (2020)
A Robust Authentication Scheme With Continuously Updated Information for Vehicular Sensor Networks
Xin Liu (2018)
An Interoperable ECC based Authentication and Key Agreement Scheme for IoT Environment
A. Sahoo (2020)
An Energy-Efficient Secure Forwarding Scheme for QoS Guarantee in Wireless Sensor Networks
D. Kim (2020)
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks
L. Roure (2018)
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs
Ding Wang (2020)
Cryptanalysis of Kumar et al.’s Authentication Protocol for Wireless Sensor Networks
Sewan Ha (2020)
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
Wenting Li (2018)
Semantic Scholar Logo Some data provided by SemanticScholar