Two-factor mutual authentication with key agreement in wireless sensor networks

被引:65
作者
Vaidya, Binod [1 ]
Makrakis, Dimitrios [1 ]
Mouftah, Hussein [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Broadband Wireless & Internetworking Res Lab, Ottawa, ON, Canada
关键词
wireless sensor network; user authentication; key agreement; password; smart card; USER AUTHENTICATION;
D O I
10.1002/sec.517
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
Wireless sensor networks (WSNs) are getting popular for their deployment in unattended environments, where a registered user can log in to the network and access data collected from the desired sensor. Because of limited resources and computation power in sensor nodes, an authentication protocol should be simple and efficient. M.L. Das proposed a two-factor authentication scheme for WSNs. Because his scheme uses only one-way hash function and XOR operation, it is well suited for resource-constrained environments. Because of some flaws in Das's scheme, several improved schemes have been introduced. In this paper, we show that Das's scheme and its derivatives not only have security imperfections but also do not provide key agreement. To overcome their security shortcomings, we propose a novel user authentication scheme with key agreement for WSN. We furnish security analysis of the proposed protocol to show its robustness to various attacks as well as analyze its performance to determine its efficiency. We provide protocol analysis and verification of the proposed protocol. Compared with the existing schemes, it is more robust and offers better security. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:171 / 183
页数:13
相关论文
共 20 条
[1]
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]
[Anonymous], 2006, IEEE Standard 802.15.4-2006
[3]
BENENSON Z, 2004, P INF 2004 WORKSH SE
[4]
Benenson Z, 2005, P REALWSN 2005 JUN
[5]
A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[6]
Sensor networks: Evolution, opportunities, and challenges [J].
Chong, CY ;
Kumar, SP .
PROCEEDINGS OF THE IEEE, 2003, 91 (08) :1247-1256
[7]
Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[8]
DAS ML, 2008, P 5 INT C INF TECHN
[9]
Kee-Won Kim, 2007, International Journal of Sensor Networks, V2, P77, DOI 10.1504/IJSNET.2007.012985
[10]
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks' [J].
Khan, Muhammad Khurram ;
Alghathbar, Khaled .
SENSORS, 2010, 10 (03) :2450-2459