Cargando…

Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising...

Descripción completa

Detalles Bibliográficos
Autores principales: Ryu, Jihyeon, Lee, Hakjun, Kim, Hyoungshick, Won, Dongho
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6308603/
https://www.ncbi.nlm.nih.gov/pubmed/30567374
http://dx.doi.org/10.3390/s18124481
_version_ 1783383227858157568
author Ryu, Jihyeon
Lee, Hakjun
Kim, Hyoungshick
Won, Dongho
author_facet Ryu, Jihyeon
Lee, Hakjun
Kim, Hyoungshick
Won, Dongho
author_sort Ryu, Jihyeon
collection PubMed
description Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.’s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks.
format Online
Article
Text
id pubmed-6308603
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-63086032019-01-04 Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks Ryu, Jihyeon Lee, Hakjun Kim, Hyoungshick Won, Dongho Sensors (Basel) Article Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.’s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks. MDPI 2018-12-18 /pmc/articles/PMC6308603/ /pubmed/30567374 http://dx.doi.org/10.3390/s18124481 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ryu, Jihyeon
Lee, Hakjun
Kim, Hyoungshick
Won, Dongho
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_full Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_fullStr Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_full_unstemmed Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_short Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_sort secure and efficient three-factor protocol for wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6308603/
https://www.ncbi.nlm.nih.gov/pubmed/30567374
http://dx.doi.org/10.3390/s18124481
work_keys_str_mv AT ryujihyeon secureandefficientthreefactorprotocolforwirelesssensornetworks
AT leehakjun secureandefficientthreefactorprotocolforwirelesssensornetworks
AT kimhyoungshick secureandefficientthreefactorprotocolforwirelesssensornetworks
AT wondongho secureandefficientthreefactorprotocolforwirelesssensornetworks