Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem For Wireless Sensor Networks

Chenyu Wang, Guoai Xu, Jing Sun
Published 2017 · Computer Science, Medicine

Save to my Library
Download PDF
Analyze on Scholarcy
Share
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.
This paper references
10.1002/dac.2468
Security flaws in two improved remote user authentication schemes using smart cards
C. Ma (2014)
10.1002/dac.2853
Design of a user anonymous password authentication scheme without smart card
S. Kumari (2016)
10.3390/s151229767
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
I. Chang (2015)
10.1016/j.comcom.2016.04.005
3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications
Riccardo Pecori (2016)
10.1166/SL.2013.2669
An Improved Two-Factor User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography
C. Li (2013)
10.1049/iet-cdt.2012.0073
Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices
C. Lee (2013)
10.1155/2017/1619741
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card
Chenyu Wang (2017)
10.3390/s16122123
Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
YoHan Park (2016)
10.1109/JSYST.2014.2301517
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
D. He (2015)
10.3390/s140610081
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
10.1155/2013/730831
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)
10.3390/s17030644
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
J. Jung (2017)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.1109/NTMS.2015.7266463
A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems
Riccardo Pecori (2015)
10.3390/s110505020
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
P. Kumar (2011)
An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
X. Li (2012)
10.1109/ACCESS.2017.2673239
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Q. Jiang (2017)
10.1007/s12083-015-0404-5
A new and secure authentication scheme for wireless sensor networks with formal proof
F. Wu (2017)
10.1016/j.jnca.2011.11.009
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
X. Li (2012)
An improved tTwo-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography
C. T. Li (2013)
10.1109/TDSC.2013.2297110
Robust Multi-Factor Authentication for Fragile Communications
Xinyi Huang (2014)
10.1109/TIFS.2017.2721359
Zipf’s Law in Passwords
Ding Wang (2017)
10.1007/s12083-014-0285-z
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1109/TIE.2009.2028351
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
Xiangxue Li (2010)
10.1016/j.ins.2015.02.010
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
10.1016/j.comnet.2016.01.006
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
10.1109/TDSC.2014.2355850
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang (2015)
10.6633/IJNS.201703.19(2).02
A Secure and Efficient One-time Password Authentication Scheme for WSN
Chung-Huei Ling (2017)
10.1145/74850.74852
A logic of authentication
M. Burrows (1989)
10.1016/j.future.2016.10.004
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S. Kumari (2017)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1631/jzus.C1000377
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong Fan (2011)
10.1002/dac.3336
A lightweight password-based authentication protocol using smart card
Chenyu Wang (2017)
the State Grid Corporation of China Key Technology Innovation Project Foundation under Grant No
(2017)
10.1007/s12652-017-0516-2
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Qi Jiang (2018)
10.1007/s00779-012-0540-3
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
Da-Zhi Sun (2012)
10.1142/S0129626411000047
Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks
C. Lee (2011)
10.1002/sec.1109
A two-factor authentication scheme with anonymity for multi-server environments
Chi-Tung Chen (2015)
10.1016/j.adhoc.2014.03.003
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
Ding Wang (2014)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
10.1016/j.comnet.2014.07.010
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang (2014)
10.1109/TIFS.2016.2573746
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
D. He (2016)
10.1109/TDSC.2016.2605087
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
Ding Wang (2018)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.4218/ETRIJ.13.0113.0103
A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
P. Kumar (2013)



This paper is referenced by
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
Group Structure of Special Parabola and Its Application in Cryptography
Bin Li (2020)
10.1155/2019/2838615
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment
Feifei Wang (2019)
10.5121/ijcnc.2019.11506
A Novel Security Protocol for Wireless Sensor Networks Based on Elliptic Curve Signcryption
A. K. Singh (2019)
BULGARIAN ACADEMY OF SCIENCES
Surender Singh (2019)
10.3390/s18113695
A Lightweight Anonymous Client–Server Authentication Scheme for the Internet of Things Scenario: LAuth
Yuwen Chen (2018)
10.1155/2018/3048697
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment
Chenyu Wang (2018)
10.14569/ijacsa.2019.0101062
LSSCW: A Lightweight Security Scheme for Cluster based Wireless Sensor Network
G. Pathak (2019)
10.1155/2018/7978027
Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs
Haowen Tan (2018)
10.3390/s20236860
A Lightweight Three-Factor Authentication Scheme for WHSN Architecture
A. Almuhaideb (2020)
10.4018/978-1-7998-5068-7.ch011
Analysis of Black-Hole Attack With Its Mitigation Techniques in Ad-hoc Network
A. Malik (2020)
10.2478/cait-2019-0008
Security of Low Computing Power Devices: A Survey of Requirements, Challenges & Possible Solutions
A. K. Singh (2019)
10.1109/ACCESS.2019.2944515
Anti-Synchronization and Robust Authentication for Noisy PUF-Based Smart Card
Yuling Chen (2019)
10.1145/3325130
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs
Ding Wang (2020)
10.1007/S11276-018-1841-X
Lightweight three factor scheme for real-time data access in wireless sensor networks
Hanguang Luo (2020)
10.1007/978-981-15-0758-8
Security and Privacy in Social Networks and Big Data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
P. Chen (2019)
10.1155/2018/2484268
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
Ke Zhang (2018)
10.1155/2018/7574238
A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
Yuwen Chen (2018)
10.1155/2020/5686498
An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems
Jiaqing Mo (2020)
10.1109/ACCESS.2019.2930542
A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map
Feifei Wang (2019)
10.1016/J.ADHOC.2019.101948
Enhanced authentication and key management scheme for securing data transmission in the internet of things
Y. Harbi (2019)
10.3390/s20154143
SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks
Sungjin Yu (2020)
10.1155/2019/2136506
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
Jiaqing Mo (2019)
10.1007/978-981-15-0758-8_8
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things
Chenyu Wang (2019)
10.1002/dac.4511
A lightweight anonymous two-factor authentication protocol for wireless sensor networks in Internet of Vehicles
Mohammad Javad Sadri (2020)
10.1002/dac.3734
An efficient and secure 3-factor user-authentication protocol for multiserver environment
M. Luo (2018)
10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00201
Authentication Protocol for Real-Time Wearable Medical Sensor Networks Using Biometrics and Continuous Monitoring
N. Mohsen (2019)
10.1109/ACCESS.2020.2985719
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things
Sooyeon Shin (2020)
10.1109/TII.2019.2963328
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang (2020)
10.1016/j.comcom.2020.06.012
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
Mengxia Shuai (2020)
Semantic Scholar Logo Some data provided by SemanticScholar