A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks

被引:7
|
作者
Yoo, Sang Guun [1 ]
Lee, Hyukjun [1 ]
Kim, Juho [1 ]
机构
[1] Sogang Univ, Dept Comp Sci & Engn, Seoul 121712, South Korea
关键词
EFFICIENT; PROTOCOL;
D O I
10.1155/2013/543950
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. On the other hand, they also present a usability constraint, in a sense that they do not consider the use case when sensor nodes cannot communicate with gateway node. In this case, data collected by isolated sensor nodes could not be accessed until they recover such communication, which is in many times not recoverable rapidly or forever (e. g., military applications, natural disaster monitoring). Due to all these reasons, this paper proposes a robust user authentication scheme which fixes the security weaknesses of previous solutions and provides wider usability considering the use case when the sensor nodes cannot communicate with the gateway node. Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] A Usable and Secure Two-Factor Authentication Scheme
    Akram, Syed
    Misbahuddin, Mohammed
    Varaprasad, G.
    INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 169 - 182
  • [22] A secure lightweight two-factor authentication scheme in global mobility networks
    Madhusudhan, R.
    Suvidha, K. S.
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2019, 9 (02) : 109 - 123
  • [23] Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
    Kim, Jun-Sub
    Kwak, Jin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [24] A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
    Chandrakar, Preeti
    Om, Hari
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 62 - 79
  • [25] Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Han, Sangchul
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    PLOS ONE, 2015, 10 (04):
  • [26] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 1 - 20
  • [27] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Peer-to-Peer Networking and Applications, 2018, 11 : 1 - 20
  • [28] A Provably Secure and Lightweight Two-Factor Authentication Protocol for Wireless Sensor Network
    Feng, Hao
    Cai, Bowen
    ELECTRONICS, 2024, 13 (21)
  • [29] A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF
    Mo, Jiaqing
    Zhang, Zhihua
    Lin, Yuhua
    ELECTRONICS, 2025, 14 (01):
  • [30] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150