Nothing Special   »   [go: up one dir, main page]

Skip to main content

Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 373))

  • 1846 Accesses

Abstract

In wireless sensor networks, user authentication scheme is a critical and important security issue to prevent adversary’s illegal approach to wireless sensors. After Das introduce a user authentication scheme for wireless sensor networks, various studies had proceeded to proposed more secure and efficient authentication scheme but many schemes had security problem on smart card attack. So Chem et al. suggested a secure user authentication scheme against smart card loss attack using symmetric key techniques but this scheme does not still resolve some security vulnerability. So by the cryptanalysis, this paper shows that Chem et al‘s scheme has problems on perfect forward secrecy, session key exposure by gateway node, anonymity, and the password check.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Science, ICT & Future Planning (NRF-2014R1A1A2002775)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Nam, J., Choo, K.K.R., Han, S., Kim, M., Paik, J., Won, D.: Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation. PLOS ONE 10(4) (2015)

    Google Scholar 

  2. Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8(3), 1086–1090 (2009)

    Article  Google Scholar 

  3. Nyang, D., Lee, M.K.: Improvement of Das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive (2009)

    Google Scholar 

  4. Khan, M.K., Alghathbar, K.: Security analysis of ‘two-factor user authentication in wireless sensor networks’. In: Advances in Computer Science and Information Technology. Lecture Notes in Computer Science, vol. 6059, pp. 55–60. Springer, Germany (2010)

    Google Scholar 

  5. Vaidya, B., Makrakis, D., Mouftah, H.T.: Improved two factor user authentication in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010), pp. 600–606, October 2010

    Google Scholar 

  6. Yuan, J.J.: An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems 55(1), 105–113 (2014)

    Article  Google Scholar 

  7. Yeh, H.L., et al.: A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography. Sensors 11(5), 4767–4779 (2011)

    Article  Google Scholar 

  8. Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D.: Security enhanced user authent-ication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6), 10081–10106 (2014)

    Article  Google Scholar 

  9. Chen, L., Fushan, W., Chuangui, M.: A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques. International Journal of Distributed Sensor Networks (2015)

    Google Scholar 

  10. Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4), 6443–6462 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongho Won .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Choi, Y., Lee, Y., Won, D. (2015). Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0281-6_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0280-9

  • Online ISBN: 978-981-10-0281-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics