Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks

被引:1
|
作者
Ryu, Jihyeon [1 ]
Lee, Youngsook [2 ]
Won, Dongho [3 ]
机构
[1] Sungkyunkwan Univ, Dept Platform Software, Seoul, South Korea
[2] Howon Univ, Cyber Secur, Gunsan Si, Jeollabuk Do, South Korea
[3] Sungkyunkwan Univ, Dept Comp Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Remote user authentication; Wireless sensor network; Biometric; 2-FACTOR USER AUTHENTICATION; SCHEME;
D O I
10.1007/978-981-15-0058-9_33
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are used to monitor various environmental conditions such as temperature, sound, pollution level, humidity, wind and so on. Therefore, fast and secure authentication is important and requires a lightweight protocol that is secure. AmirHosein et al. proposed a 3-factor protocol in wireless sensor networks, but we found that the protocol in the wireless sensor network had some weaknesses. Firstly, it is a weakness in smart card deodorization. And it is also vulnerable to user impersonation. Moreover, it is possible to attack the session key. In this paper, we describe this weakness and prove AmirHosein et al.'s scheme is insecure.
引用
收藏
页码:341 / 349
页数:9
相关论文
共 50 条
  • [41] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [42] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 229 - 243
  • [43] Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
    Wang, Ding
    Li, Wenting
    Wang, Ping
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) : 4064 - 4075
  • [44] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    Debiao He
    Yuanyuan Zhang
    Jianhua Chen
    [J]. Wireless Personal Communications, 2014, 74 : 229 - 243
  • [45] A Lightweight Anonymous Authentication Protocol Based on Shared Key in Wireless Networks
    无线网络中基于共享密钥的轻量级匿名认证协议
    [J]. Li, Xing-Hua (xhli1@mail.xidian.edu.cn), 2018, Science Press (41):
  • [46] Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks
    Xie, Qi
    Tang, Zhixiong
    Chen, Kefei
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 218 - 230
  • [47] A lightweight three-factor authentication protocol for digital rights management system
    Yu, SungJin
    Park, KiSung
    Park, YoHan
    Kim, HyungPyo
    Park, YoungHo
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1340 - 1356
  • [48] A lightweight three-factor authentication protocol for digital rights management system
    SungJin Yu
    KiSung Park
    YoHan Park
    HyungPyo Kim
    YoungHo Park
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1340 - 1356
  • [49] A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT
    Kou, Liang
    Shi, Yiqi
    Zhang, Liguo
    Liu, Duo
    Yang, Qing
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (02): : 545 - 565
  • [50] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 1 - 20