On the Security of a Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

被引:0
|
作者
Xiong, Ling [1 ]
Peng, Daiyuan [1 ]
Peng, Tu [2 ]
Liang, Hongbin [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 611756, Sichuan, Peoples R China
[2] Beijing Inst Technol, Sch Software, Beijing 100081, Peoples R China
[3] Southwest Jiaotong Univ, Sch Transportat & Logist, Chengdu 611756, Sichuan, Peoples R China
基金
美国国家科学基金会;
关键词
authentication; user anonymity; wireless sensor networks; 2-FACTOR USER AUTHENTICATION; SCHEME;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most recently, Cope and Hwang (IEEE Transactions on Industrial Electronics, 2016. doi:10.1109/TIE.2016.2585081) proposed a realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks(WSNs). They demonstrated that the scheme could resist various attacks. However, in this paper, we find out that Gope and Hwang's scheme suffers from several security flaws, including smart card loss attack, known session-specific temporary information attack, de-synchronization attack, and known transaction sequence number attack. Some possible countermeasures are provided to avoid these design flaws in the future design of lightweight authentication schemes.
引用
收藏
页码:342 / 346
页数:5
相关论文
共 50 条
  • [1] A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
    Gope, Prosanta
    Hwang, Tzonelih
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (11) : 7124 - 7132
  • [2] Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
    Gope, Prosanta
    Das, Ashok Kumar
    Kumar, Neeraj
    Cheng, Yongqiang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (09) : 4957 - 4968
  • [3] Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks
    Ryu, Jihyeon
    Lee, Youngsook
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019), 2020, 603 : 341 - 349
  • [4] Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
    AmirHosein Adavoudi-Jolfaei
    Maede Ashouri-Talouki
    Seyed Farhad Aghili
    [J]. Peer-to-Peer Networking and Applications, 2019, 12 : 43 - 59
  • [5] Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
    Adavoudi-Jolfaei, AmirHosein
    Ashouri-Talouki, Maede
    Aghili, Seyed Farhad
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) : 43 - 59
  • [6] Security Solution for Real-Time Data Access in Wireless Sensor Networks
    Luo, Hanguang
    Wen, Guangjun
    Su, Jian
    [J]. CLOUD COMPUTING AND SECURITY, PT VI, 2018, 11068 : 37 - 48
  • [7] Lightweight three factor scheme for real-time data access in wireless sensor networks
    Hanguang Luo
    Guangjun Wen
    Jian Su
    [J]. Wireless Networks, 2020, 26 : 955 - 970
  • [8] Lightweight three factor scheme for real-time data access in wireless sensor networks
    Luo, Hanguang
    Wen, Guangjun
    Su, Jian
    [J]. WIRELESS NETWORKS, 2020, 26 (02) : 955 - 970
  • [9] A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
    Xiong, Ling
    Peng, Daiyuan
    Peng, Tu
    Liang, Hongbin
    Liu, Zhicai
    [J]. SENSORS, 2017, 17 (11)
  • [10] A robust authentication and access control protocol for securing wireless healthcare sensor networks
    Ali, Zeeshan
    Ghani, Anwar
    Khan, Imran
    Chaudhry, Shehzad Ashraf
    Islam, S. K. Hafizul
    Giri, Debasis
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52