Cargando…
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. Use...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5750781/ https://www.ncbi.nlm.nih.gov/pubmed/29257066 http://dx.doi.org/10.3390/s17122946 |
_version_ | 1783289800755773440 |
---|---|
author | Wang, Chenyu Xu, Guoai Sun, Jing |
author_facet | Wang, Chenyu Xu, Guoai Sun, Jing |
author_sort | Wang, Chenyu |
collection | PubMed |
description | As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. |
format | Online Article Text |
id | pubmed-5750781 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-57507812018-01-10 An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks Wang, Chenyu Xu, Guoai Sun, Jing Sensors (Basel) Article As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. MDPI 2017-12-19 /pmc/articles/PMC5750781/ /pubmed/29257066 http://dx.doi.org/10.3390/s17122946 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Wang, Chenyu Xu, Guoai Sun, Jing An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks |
title | An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks |
title_full | An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks |
title_fullStr | An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks |
title_full_unstemmed | An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks |
title_short | An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks |
title_sort | enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5750781/ https://www.ncbi.nlm.nih.gov/pubmed/29257066 http://dx.doi.org/10.3390/s17122946 |
work_keys_str_mv | AT wangchenyu anenhancedthreefactoruserauthenticationschemeusingellipticcurvecryptosystemforwirelesssensornetworks AT xuguoai anenhancedthreefactoruserauthenticationschemeusingellipticcurvecryptosystemforwirelesssensornetworks AT sunjing anenhancedthreefactoruserauthenticationschemeusingellipticcurvecryptosystemforwirelesssensornetworks AT wangchenyu enhancedthreefactoruserauthenticationschemeusingellipticcurvecryptosystemforwirelesssensornetworks AT xuguoai enhancedthreefactoruserauthenticationschemeusingellipticcurvecryptosystemforwirelesssensornetworks AT sunjing enhancedthreefactoruserauthenticationschemeusingellipticcurvecryptosystemforwirelesssensornetworks |