DOI QR코드

DOI QR Code

Security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks

무선 센서 네트워크 환경을 위한 보안성이 향상된 프라이버시 보호형 two-factor 인증 프로토콜

  • 최윤성 (호원대학교 컴퓨터학부 사이버보안전공) ;
  • 장범환 (호원대학교 컴퓨터학부 사이버보안전공)
  • Received : 2019.10.24
  • Accepted : 2019.12.03
  • Published : 2019.12.30

Abstract

Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol.

Keywords

References

  1. Kumari, Saru, Muhammad Khurram Khan, and Mohammed Atiquzzaman, "User authentication schemes for wireless sensor networks: A review," Ad Hoc Networks, 2015, pp.159-194. https://doi.org/10.1016/j.adhoc.2014.11.018
  2. Jiang, Qi, et al, "A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks," International Journal of Network Management, Vol.27, No.3, 2017.
  3. Choi, Younsung, et al, "Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, Vol.14, No.6, 2014, pp.10081-10106. https://doi.org/10.3390/s140610081
  4. Khan, Muhammad Khurram, and Khaled Alghathbar, "Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'," Sensors, Vol.10, No.3, 2010, pp.2450-2459. https://doi.org/10.3390/s100302450
  5. Das, Manik Lal, "Two-factor user authentication in wireless sensor networks," IEEE transactions on wireless communications Vol.8, No.3, 2009, pp.1086-1090. https://doi.org/10.1109/TWC.2008.080128
  6. Chaudhry, Shehzad Ashraf, et al, "An improved and provably secure privacy preserving authentication protocol for SIP," Peer-to-Peer Networking and Applications, Vol.10, No.1, 2017, pp.1-15. https://doi.org/10.1007/s12083-015-0400-9
  7. He, Daojing, et al, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad hoc & sensor wireless networks, Vol.10, No.4, 2010, pp.361-371.
  8. Yeh, Hsiu-Lien, et al, "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, Vol.11, No.5, 2011, pp.4767-4779. https://doi.org/10.3390/s110504767
  9. Shi, Wenbo, and Peng Gong, "A new user authentication protocol for wireless sensor networks using elliptic curves cryptography," International Journal of Distributed Sensor Networks, Vol.9, No.4, 2013.
  10. Chen, Tien‐Ho, and Wei‐Kuan Shih, "A robust mutual authentication protocol for wireless sensor networks," ETRI journal, Vol.32, No.5, 2010, pp.704-712. https://doi.org/10.4218/etrij.10.1510.0134
  11. Wang, Ding, et al, "Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment," IEEE Transactions on Dependable and Secure Computing, Vol.12, No.4, 2014, pp.428-442. https://doi.org/10.1109/TDSC.2014.2355850
  12. Hankerson, Darrel, Alfred J. Menezes, and Scott Vanstone, "Guide to elliptic curve cryptography," Computing Reviews, Vol.46, No.1, 2005.
  13. Choi, Younsung, et al, "Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics," The Scientific World Journal, 2014.
  14. Choi, Younsung, Youngsook Lee, and Dongho Won, "Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction," International Journal of Distributed Sensor Networks, Vol.12, No.1, 2016.
  15. Jung, Jaewook, et al, "An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks," Sensors, Vol.16, No.8, 2016.
  16. 박중오, "무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계", 디지털산업정보학회 논문지, 제15권, 제2호, 2019, pp.43-52.
  17. 이재영, "스마트카드 기반의 사용자 인증 기법에 관한 연구", 디지털산업정보학회 논문지, 제14권, 제2호, 2018, pp.27-33.