Cryptanalysis of a strong authentication scheme with user privacy for wireless sensor networks

被引:0
|
作者
Xu, Chengbo [1 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan 250022, Shandong, Peoples R China
关键词
authentication; password; smart card; session key agreement; wireless sensor netwoks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication and key agreement scheme is an important mechanism for legal users to access the services of wireless sensor network. However, the design of authentication and key agreement schemes in WSNs is still quite a challenging problem. In this paper, we analyze a strong authentication scheme with user privacy for WSNs proposed by Kumar et al. in 2013, and point out the scheme can not resist known session key attack, impersonation attack, sensor node capture attack and suffer from forward security problem, anonymity and untraceability problem.
引用
收藏
页码:425 / 430
页数:6
相关论文
共 50 条
  • [1] A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    Lee, Sang-Gon
    Lee, HoonJae
    ETRI JOURNAL, 2013, 35 (05) : 889 - 899
  • [2] Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
    Lee, Yung-Cheng
    Lai, Hsin-Yu
    Lee, Pei-Ju
    INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY INNOVATION, 2012, 2 (04) : 283 - 292
  • [3] Cryptanalysis of a Privacy-Preserving and Provable User Authentication Scheme for Wireless Sensor Networks based on Internet of Things Security
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Song, Taeui
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 432 - 437
  • [4] Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    IET NETWORKS, 2020, 9 (06) : 315 - 325
  • [5] Cryptanalysis of "A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks"
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 312 - 317
  • [6] Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks
    Wei, Fushan
    Ma, Jianfeng
    Jiang, Qi
    Shen, Jian
    Ma, Chuangui
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 62 - 70
  • [7] Enhanced User Authentication Scheme for Wireless Sensor Networks
    Park, Hee-Joo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 367 - 374
  • [8] A dynamic User Authentication scheme for wireless sensor networks
    Wong, Kirk H. M.
    Zheng, Yuan
    Cao, Jiannong
    Wang, Shengwei
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 244 - +
  • [9] Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks
    Ryu, Jihyeon
    Song, Taeui
    Moon, Jongho
    Kim, Hyoungshick
    Won, Dongho
    COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 49 - 58
  • [10] Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network
    Singh, Akansha
    Awasthi, Amit K.
    Singh, Karan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1881 - 1898