Cargando…
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5375930/ https://www.ncbi.nlm.nih.gov/pubmed/28335572 http://dx.doi.org/10.3390/s17030644 |
_version_ | 1782519088286793728 |
---|---|
author | Jung, Jaewook Moon, Jongho Lee, Donghoon Won, Dongho |
author_facet | Jung, Jaewook Moon, Jongho Lee, Donghoon Won, Dongho |
author_sort | Jung, Jaewook |
collection | PubMed |
description | At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. |
format | Online Article Text |
id | pubmed-5375930 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-53759302017-04-10 Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks Jung, Jaewook Moon, Jongho Lee, Donghoon Won, Dongho Sensors (Basel) Article At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. MDPI 2017-03-21 /pmc/articles/PMC5375930/ /pubmed/28335572 http://dx.doi.org/10.3390/s17030644 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Jung, Jaewook Moon, Jongho Lee, Donghoon Won, Dongho Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks |
title | Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks |
title_full | Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks |
title_fullStr | Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks |
title_full_unstemmed | Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks |
title_short | Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks |
title_sort | efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5375930/ https://www.ncbi.nlm.nih.gov/pubmed/28335572 http://dx.doi.org/10.3390/s17030644 |
work_keys_str_mv | AT jungjaewook efficientandsecurityenhancedanonymousauthenticationwithkeyagreementschemeinwirelesssensornetworks AT moonjongho efficientandsecurityenhancedanonymousauthenticationwithkeyagreementschemeinwirelesssensornetworks AT leedonghoon efficientandsecurityenhancedanonymousauthenticationwithkeyagreementschemeinwirelesssensornetworks AT wondongho efficientandsecurityenhancedanonymousauthenticationwithkeyagreementschemeinwirelesssensornetworks |