An Improved Two-Factor User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography

被引:5
|
作者
Li, Chun-Ta [1 ]
Lee, Cheng-Chi [2 ,3 ]
Lee, Chin-Wen [1 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, Tainan 71002, Taiwan
[2] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Taipei 24205, Taiwan
[3] Asia Univ, Dept Photon & Commun Engn, Taichung 41354, Taiwan
关键词
Password Authentication; Smart Card; Wireless Sensor Networks (WSNs); Information Security; Elliptic Curve Cryptography (ECC); SECURITY; SCHEME;
D O I
10.1166/sl.2013.2669
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the rapid development of wireless and mobile communication techniques, Wireless Sensor Networks (WSNs) have attracted great attention in recent years and have been widely used in practical applications, such as monitoring of ocean tsunami, detection of battlefield environment, entrance guard system, medical or science areas and even in our home life. A two-factor (password and smart card) user authentication has been widely used in WSNs to protect secure communications from unauthorized users. Recently, Yeh et al. proposed an ECC-based user authentication protocol for preventing all the security problems of the previous schemes. They claimed that their protocol preserves mutual authentication and protected from several attacks. However, in this article, we point out that Yeh et al.'s protocol cannot provide the protection against the private key disclosure attack, smart card lost problems, off-line password guessing attack, authentication key disclosure attack, session key disclosure attack and many logged-in users' attack. To remedy these security flaws, we propose an improved two-factor user authentication protocol, which covers all the identified weaknesses of Yeh et al.'s protocol and is more secure and efficient for practical WSN environments.
引用
收藏
页码:958 / 965
页数:8
相关论文
共 50 条
  • [1] A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
    Jiang, Qi
    Kumar, Neeraj
    Ma, Jianfeng
    Shen, Jian
    He, Debiao
    Chilamkurti, Naveen
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (03)
  • [2] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Zhang, Liping
    Tang, Shanyu
    Chen, Jing
    Zhu, Shaohui
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 53 - 75
  • [3] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Liping Zhang
    Shanyu Tang
    Jing Chen
    Shaohui Zhu
    [J]. Wireless Personal Communications, 2015, 81 : 53 - 75
  • [4] Improved Two-factor User Authentication in Wireless Sensor Networks
    Vaidya, Binod
    Makrakis, Dimitrios
    Mouftah, Hussein T.
    [J]. 2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 600 - 606
  • [5] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [6] A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Shi, Wenbo
    Gong, Peng
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [7] An Improved Three-Factor Remote User Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Li, Bin
    Ji, Zhi-Yong
    [J]. International Journal of Network Security, 2022, 24 (03) : 521 - 532
  • [8] An enhanced two-factor user authentication in wireless sensor networks
    Yuan, Jian-Jun
    [J]. TELECOMMUNICATION SYSTEMS, 2014, 55 (01) : 105 - 113
  • [9] An enhanced two-factor user authentication in wireless sensor networks
    Jian-Jun Yuan
    [J]. Telecommunication Systems, 2014, 55 : 105 - 113
  • [10] TWO ATTACKS ON A TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Shun-Der
    [J]. PARALLEL PROCESSING LETTERS, 2011, 21 (01) : 21 - 26