On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks

被引:19
|
作者
He, Jun [1 ]
Yang, Zheng [1 ,2 ]
Zhang, Jianxun [1 ]
Liu, Wanping [1 ]
Liu, Chao [1 ]
机构
[1] Chongqing Univ Technol, Sch Comp Sci & Engn, Chongqing, Peoples R China
[2] Univ Helsinki, Dept Comp Sci, Gustaf Hallstromin Katu 2b, Helsinki 00014, Finland
基金
中国国家自然科学基金;
关键词
Cryptanalysis; authenticated key exchange; wireless sensor network; security attack; security model; KEY AGREEMENT SCHEME; USER AUTHENTICATION; PROTOCOL; INTERNET;
D O I
10.1177/1550147718756311
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a recent paper, Chang and Le proposed an efficient smart card-based authenticated key exchange protocol (which is referred to as CL scheme) for heterogeneous ad hoc wireless sensor networks. However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. An improved protocol is proposed to fix this problem.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
    Chang, Chin-Chen
    Le, Hai-Duong
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 357 - 366
  • [2] An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Zhao, Jing
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (06): : 977 - 985
  • [3] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [4] A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Lee, Youngsook
    Won, Dongho
    [J]. SENSORS, 2014, 14 (11): : 21023 - 21044
  • [5] Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks
    Xu, Guoai
    Wang, Feifei
    Zhang, Miao
    Peng, Junhao
    [J]. IEEE ACCESS, 2020, 8 (08): : 47282 - 47294
  • [6] Secure Mutual Authentication for Ad hoc Wireless Networks
    Byung-Gi Kim
    Sang-Sun Hong
    [J]. The Journal of Supercomputing, 2005, 33 : 123 - 132
  • [7] Secure mutual authentication for ad hoc wireless networks
    Kim Byung-Gi
    Sang-Sun Hong
    [J]. The Journal of Supercomputing, 2005, 33 (1-2) : 123 - 132
  • [8] Secure mutual authentication for ad hoc wireless networks
    Kim, BG
    Hong, SS
    [J]. JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 123 - 132
  • [9] Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Yang, Lei
    Luo, Jia-Ning
    Tso, Raylin
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (07): : 6992 - 7020
  • [10] Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
    Tsu-Yang Wu
    Zhiyuan Lee
    Lei Yang
    Jia-Ning Luo
    Raylin Tso
    [J]. The Journal of Supercomputing, 2021, 77 : 6992 - 7020