Inviting an author to review:
Find an author and click ‘Invite to review selected article’ near their name.
Search for authorsSearch for similar articles
19
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.

          Related collections

          Most cited references29

          • Record: found
          • Abstract: not found
          • Article: not found

          Two-factor user authentication in wireless sensor networks

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Authenticated Key Exchange Secure against Dictionary Attacks

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

              User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
                Bookmark

                Author and article information

                Contributors
                Role: Academic Editor
                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                30 November 2015
                December 2015
                : 15
                : 12
                : 29841-29854
                Affiliations
                [1 ]Department of Digital Applications, Kang Ning University, Tainan 70970, Taiwan; ipin@ 123456ukn.edu.tw
                [2 ]Department of Medical Informatics, Tzu Chi University, No. 701, Zhongyang Road, Sec. 3, Hualien 97004, Taiwan
                [3 ]Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung 41170, Taiwan; duke@ 123456ncut.edu.tw
                [4 ]Department of Computer Science and Information Engineering, National Taipei University of Technology, Taipei 10608, Taiwan; cmliu@ 123456csie.ntut.edu.tw
                Author notes
                [* ]Correspondence: jackytflee@ 123456mail.tcu.edu.tw ; Tel.: +886-3856-5301 (ext. 2403); Fax: +886-3857-9409
                Article
                sensors-15-29767
                10.3390/s151229767
                4721688
                26633396
                c693f79a-a9f0-44c2-847c-e4bb8715b8fb
                © 2015 by the authors; licensee MDPI, Basel, Switzerland.

                This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 02 September 2015
                : 20 November 2015
                Categories
                Article

                Biomedical engineering
                authentication,key agreement,dynamic identity,wireless sensor networks,password,smartcard

                Comments

                Comment on this article