Cargando…

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that...

Descripción completa

Detalles Bibliográficos
Autores principales: Kim, Jiye, Lee, Donghoon, Jeon, Woongryul, Lee, Youngsook, Won, Dongho
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4029696/
https://www.ncbi.nlm.nih.gov/pubmed/24721764
http://dx.doi.org/10.3390/s140406443
_version_ 1782317259836882944
author Kim, Jiye
Lee, Donghoon
Jeon, Woongryul
Lee, Youngsook
Won, Dongho
author_facet Kim, Jiye
Lee, Donghoon
Jeon, Woongryul
Lee, Youngsook
Won, Dongho
author_sort Kim, Jiye
collection PubMed
description User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.
format Online
Article
Text
id pubmed-4029696
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-40296962014-05-22 Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks Kim, Jiye Lee, Donghoon Jeon, Woongryul Lee, Youngsook Won, Dongho Sensors (Basel) Article User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. MDPI 2014-04-09 /pmc/articles/PMC4029696/ /pubmed/24721764 http://dx.doi.org/10.3390/s140406443 Text en © 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Kim, Jiye
Lee, Donghoon
Jeon, Woongryul
Lee, Youngsook
Won, Dongho
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
title Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
title_full Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
title_fullStr Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
title_full_unstemmed Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
title_short Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
title_sort security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4029696/
https://www.ncbi.nlm.nih.gov/pubmed/24721764
http://dx.doi.org/10.3390/s140406443
work_keys_str_mv AT kimjiye securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks
AT leedonghoon securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks
AT jeonwoongryul securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks
AT leeyoungsook securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks
AT wondongho securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks