Two-factor mutual authentication with key agreement in wireless sensor networks

被引:51
|
作者
Vaidya, Binod [1 ]
Makrakis, Dimitrios [1 ]
Mouftah, Hussein [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Broadband Wireless & Internetworking Res Lab, Ottawa, ON, Canada
关键词
wireless sensor network; user authentication; key agreement; password; smart card; USER AUTHENTICATION;
D O I
10.1002/sec.517
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are getting popular for their deployment in unattended environments, where a registered user can log in to the network and access data collected from the desired sensor. Because of limited resources and computation power in sensor nodes, an authentication protocol should be simple and efficient. M.L. Das proposed a two-factor authentication scheme for WSNs. Because his scheme uses only one-way hash function and XOR operation, it is well suited for resource-constrained environments. Because of some flaws in Das's scheme, several improved schemes have been introduced. In this paper, we show that Das's scheme and its derivatives not only have security imperfections but also do not provide key agreement. To overcome their security shortcomings, we propose a novel user authentication scheme with key agreement for WSN. We furnish security analysis of the proposed protocol to show its robustness to various attacks as well as analyze its performance to determine its efficiency. We provide protocol analysis and verification of the proposed protocol. Compared with the existing schemes, it is more robust and offers better security. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:171 / 183
页数:13
相关论文
共 50 条
  • [21] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Sun, Da-Zhi
    Li, Jian-Xin
    Feng, Zhi-Yong
    Cao, Zhen-Fu
    Xu, Guang-Quan
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 895 - 905
  • [22] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Da-Zhi Sun
    Jian-Xin Li
    Zhi-Yong Feng
    Zhen-Fu Cao
    Guang-Quan Xu
    Personal and Ubiquitous Computing, 2013, 17 : 895 - 905
  • [23] An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Das, Ashok Kumar
    Yoo, Kee-Young
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 144 - 148
  • [24] A Secure Two-Factor Mutual Authentication and Session Key Agreement Protocol using Elliptic Curve Cryptography
    Chandrakar, Preeti
    Om, Hari
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, VISION AND INFORMATION SECURITY (CGVIS), 2015, : 175 - 180
  • [25] A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    Xue, Kaiping
    Ma, Changsha
    Hong, Peilin
    Ding, Rong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 316 - 323
  • [26] An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    SENSORS, 2016, 16 (06)
  • [27] Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks
    Shin, Sooyeon
    Kwon, Taekyoung
    IEEE ACCESS, 2018, 6 : 11229 - 11241
  • [28] Robust two-factor authentication and key agreement preserving user privacy
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Yang, Li
    International Journal of Network Security, 2014, 16 (03) : 229 - 240
  • [29] User-centric Two-factor Authentication Key Agreement Protocol
    Yang, Xue
    Liu, Yi-Jing
    Jiang, Qi
    Wang, Jin-Hua
    Li, Xing-Hua
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4859 - 4875
  • [30] Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks
    Wei, Fushan
    Ma, Jianfeng
    Jiang, Qi
    Shen, Jian
    Ma, Chuangui
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 62 - 70