Cargando…
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4721688/ https://www.ncbi.nlm.nih.gov/pubmed/26633396 http://dx.doi.org/10.3390/s151229767 |
_version_ | 1782411258765508608 |
---|---|
author | Chang, I-Pin Lee, Tian-Fu Lin, Tsung-Hung Liu, Chuan-Ming |
author_facet | Chang, I-Pin Lee, Tian-Fu Lin, Tsung-Hung Liu, Chuan-Ming |
author_sort | Chang, I-Pin |
collection | PubMed |
description | Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. |
format | Online Article Text |
id | pubmed-4721688 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-47216882016-01-26 Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks Chang, I-Pin Lee, Tian-Fu Lin, Tsung-Hung Liu, Chuan-Ming Sensors (Basel) Article Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. MDPI 2015-11-30 /pmc/articles/PMC4721688/ /pubmed/26633396 http://dx.doi.org/10.3390/s151229767 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chang, I-Pin Lee, Tian-Fu Lin, Tsung-Hung Liu, Chuan-Ming Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks |
title | Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks |
title_full | Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks |
title_fullStr | Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks |
title_full_unstemmed | Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks |
title_short | Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks |
title_sort | enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4721688/ https://www.ncbi.nlm.nih.gov/pubmed/26633396 http://dx.doi.org/10.3390/s151229767 |
work_keys_str_mv | AT changipin enhancedtwofactorauthenticationandkeyagreementusingdynamicidentitiesinwirelesssensornetworks AT leetianfu enhancedtwofactorauthenticationandkeyagreementusingdynamicidentitiesinwirelesssensornetworks AT lintsunghung enhancedtwofactorauthenticationandkeyagreementusingdynamicidentitiesinwirelesssensornetworks AT liuchuanming enhancedtwofactorauthenticationandkeyagreementusingdynamicidentitiesinwirelesssensornetworks |