Cargando…

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security...

Descripción completa

Detalles Bibliográficos
Autores principales: Choi, Younsung, Lee, Donghoon, Kim, Jiye, Jung, Jaewook, Nam, Junghyun, Won, Dongho
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4118368/
https://www.ncbi.nlm.nih.gov/pubmed/24919012
http://dx.doi.org/10.3390/s140610081
_version_ 1782328834216951808
author Choi, Younsung
Lee, Donghoon
Kim, Jiye
Jung, Jaewook
Nam, Junghyun
Won, Dongho
author_facet Choi, Younsung
Lee, Donghoon
Kim, Jiye
Jung, Jaewook
Nam, Junghyun
Won, Dongho
author_sort Choi, Younsung
collection PubMed
description Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
format Online
Article
Text
id pubmed-4118368
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-41183682014-08-01 Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography Choi, Younsung Lee, Donghoon Kim, Jiye Jung, Jaewook Nam, Junghyun Won, Dongho Sensors (Basel) Article Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. MDPI 2014-06-10 /pmc/articles/PMC4118368/ /pubmed/24919012 http://dx.doi.org/10.3390/s140610081 Text en © 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Choi, Younsung
Lee, Donghoon
Kim, Jiye
Jung, Jaewook
Nam, Junghyun
Won, Dongho
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_full Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_fullStr Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_full_unstemmed Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_short Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
title_sort security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4118368/
https://www.ncbi.nlm.nih.gov/pubmed/24919012
http://dx.doi.org/10.3390/s140610081
work_keys_str_mv AT choiyounsung securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT leedonghoon securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT kimjiye securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT jungjaewook securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT namjunghyun securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography
AT wondongho securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography