Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'

被引:332
作者
Khan, Muhammad Khurram [1 ]
Alghathbar, Khaled [1 ,2 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh 11451, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11451, Saudi Arabia
关键词
authentication; wireless sensor network; security; smart card; cryptanalysis;
D O I
10.3390/s100302450
中图分类号
O65 [分析化学];
学科分类号
070302 [分析化学];
摘要
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M. L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M. L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M. L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M. L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.
引用
收藏
页码:2450 / 2459
页数:10
相关论文
共 17 条
[1]
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]
BENENSON Z, 2004, P WORKSH SENS NETW U, P385
[3]
BINOD V, 2009, P ACM Q2SWINET CAN I, P88
[4]
An Overview on Wireless Sensor Networks Technology and Evolution [J].
Buratti, Chiara ;
Conti, Andrea ;
Dardari, Davide ;
Verdone, Roberto .
SENSORS, 2009, 9 (09) :6869-6896
[5]
Callaway E.H., 2003, WIRELESS SENSOR NETW
[6]
Sensor networks: Evolution, opportunities, and challenges [J].
Chong, CY ;
Kumar, SP .
PROCEEDINGS OF THE IEEE, 2003, 91 (08) :1247-1256
[7]
Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[8]
Improving the security of 'a flexible biometrics remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) :82-85
[9]
Ko LC, 2008, 2008 IEEE INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2008), P191
[10]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388