Cargando…
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4029696/ https://www.ncbi.nlm.nih.gov/pubmed/24721764 http://dx.doi.org/10.3390/s140406443 |
_version_ | 1782317259836882944 |
---|---|
author | Kim, Jiye Lee, Donghoon Jeon, Woongryul Lee, Youngsook Won, Dongho |
author_facet | Kim, Jiye Lee, Donghoon Jeon, Woongryul Lee, Youngsook Won, Dongho |
author_sort | Kim, Jiye |
collection | PubMed |
description | User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. |
format | Online Article Text |
id | pubmed-4029696 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-40296962014-05-22 Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks Kim, Jiye Lee, Donghoon Jeon, Woongryul Lee, Youngsook Won, Dongho Sensors (Basel) Article User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. MDPI 2014-04-09 /pmc/articles/PMC4029696/ /pubmed/24721764 http://dx.doi.org/10.3390/s140406443 Text en © 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/). |
spellingShingle | Article Kim, Jiye Lee, Donghoon Jeon, Woongryul Lee, Youngsook Won, Dongho Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks |
title | Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks |
title_full | Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks |
title_fullStr | Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks |
title_full_unstemmed | Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks |
title_short | Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks |
title_sort | security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4029696/ https://www.ncbi.nlm.nih.gov/pubmed/24721764 http://dx.doi.org/10.3390/s140406443 |
work_keys_str_mv | AT kimjiye securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks AT leedonghoon securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks AT jeonwoongryul securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks AT leeyoungsook securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks AT wondongho securityanalysisandimprovementsoftwofactormutualauthenticationwithkeyagreementinwirelesssensornetworks |