Abstract
In wireless sensor networks, user authentication scheme is a critical and important security issue to prevent adversary’s illegal approach to wireless sensors. After Das introduce a user authentication scheme for wireless sensor networks, various studies had proceeded to proposed more secure and efficient authentication scheme but many schemes had security problem on smart card attack. So Chem et al. suggested a secure user authentication scheme against smart card loss attack using symmetric key techniques but this scheme does not still resolve some security vulnerability. So by the cryptanalysis, this paper shows that Chem et al‘s scheme has problems on perfect forward secrecy, session key exposure by gateway node, anonymity, and the password check.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Science, ICT & Future Planning (NRF-2014R1A1A2002775)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Nam, J., Choo, K.K.R., Han, S., Kim, M., Paik, J., Won, D.: Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation. PLOS ONE 10(4) (2015)
Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8(3), 1086–1090 (2009)
Nyang, D., Lee, M.K.: Improvement of Das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive (2009)
Khan, M.K., Alghathbar, K.: Security analysis of ‘two-factor user authentication in wireless sensor networks’. In: Advances in Computer Science and Information Technology. Lecture Notes in Computer Science, vol. 6059, pp. 55–60. Springer, Germany (2010)
Vaidya, B., Makrakis, D., Mouftah, H.T.: Improved two factor user authentication in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010), pp. 600–606, October 2010
Yuan, J.J.: An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems 55(1), 105–113 (2014)
Yeh, H.L., et al.: A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography. Sensors 11(5), 4767–4779 (2011)
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D.: Security enhanced user authent-ication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6), 10081–10106 (2014)
Chen, L., Fushan, W., Chuangui, M.: A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques. International Journal of Distributed Sensor Networks (2015)
Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4), 6443–6462 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Choi, Y., Lee, Y., Won, D. (2015). Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)