Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-12-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/18/12/4481 |
id |
doaj-585a483ec3bb4940a341b8e267f6b99a |
---|---|
record_format |
Article |
spelling |
doaj-585a483ec3bb4940a341b8e267f6b99a2020-11-24T21:45:52ZengMDPI AGSensors1424-82202018-12-011812448110.3390/s18124481s18124481Secure and Efficient Three-Factor Protocol for Wireless Sensor NetworksJihyeon Ryu0Hakjun Lee1Hyoungshick Kim2Dongho Won3Department of Platform Software, Sungkyunkwan University, Gyeonggi-do 16419, KoreaDepartment of Electrical and Computer Engineering, Sungkyunkwan University, Gyeonggi-do 16419, KoreaDepartment of Computer Engineering, Sungkyunkwan University, Gyeonggi-do 16419, KoreaDepartment of Computer Engineering, Sungkyunkwan University, Gyeonggi-do 16419, KoreaWireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.’s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks.https://www.mdpi.com/1424-8220/18/12/4481wireless sensor networksuser authenticationbiometricsmart card |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jihyeon Ryu Hakjun Lee Hyoungshick Kim Dongho Won |
spellingShingle |
Jihyeon Ryu Hakjun Lee Hyoungshick Kim Dongho Won Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks Sensors wireless sensor networks user authentication biometric smart card |
author_facet |
Jihyeon Ryu Hakjun Lee Hyoungshick Kim Dongho Won |
author_sort |
Jihyeon Ryu |
title |
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks |
title_short |
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks |
title_full |
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks |
title_fullStr |
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks |
title_full_unstemmed |
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks |
title_sort |
secure and efficient three-factor protocol for wireless sensor networks |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2018-12-01 |
description |
Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.’s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks. |
topic |
wireless sensor networks user authentication biometric smart card |
url |
https://www.mdpi.com/1424-8220/18/12/4481 |
work_keys_str_mv |
AT jihyeonryu secureandefficientthreefactorprotocolforwirelesssensornetworks AT hakjunlee secureandefficientthreefactorprotocolforwirelesssensornetworks AT hyoungshickkim secureandefficientthreefactorprotocolforwirelesssensornetworks AT donghowon secureandefficientthreefactorprotocolforwirelesssensornetworks |
_version_ |
1725903687136575488 |