Cargando…
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4118368/ https://www.ncbi.nlm.nih.gov/pubmed/24919012 http://dx.doi.org/10.3390/s140610081 |
_version_ | 1782328834216951808 |
---|---|
author | Choi, Younsung Lee, Donghoon Kim, Jiye Jung, Jaewook Nam, Junghyun Won, Dongho |
author_facet | Choi, Younsung Lee, Donghoon Kim, Jiye Jung, Jaewook Nam, Junghyun Won, Dongho |
author_sort | Choi, Younsung |
collection | PubMed |
description | Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. |
format | Online Article Text |
id | pubmed-4118368 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-41183682014-08-01 Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography Choi, Younsung Lee, Donghoon Kim, Jiye Jung, Jaewook Nam, Junghyun Won, Dongho Sensors (Basel) Article Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. MDPI 2014-06-10 /pmc/articles/PMC4118368/ /pubmed/24919012 http://dx.doi.org/10.3390/s140610081 Text en © 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/). |
spellingShingle | Article Choi, Younsung Lee, Donghoon Kim, Jiye Jung, Jaewook Nam, Junghyun Won, Dongho Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title | Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_full | Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_fullStr | Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_full_unstemmed | Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_short | Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography |
title_sort | security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4118368/ https://www.ncbi.nlm.nih.gov/pubmed/24919012 http://dx.doi.org/10.3390/s140610081 |
work_keys_str_mv | AT choiyounsung securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT leedonghoon securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT kimjiye securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT jungjaewook securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT namjunghyun securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography AT wondongho securityenhanceduserauthenticationprotocolforwirelesssensornetworksusingellipticcurvescryptography |