Browse > Article
http://dx.doi.org/10.17662/ksdim.2019.15.4.071

Security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks  

Choi, Younsung (호원대학교 컴퓨터학부 사이버보안전공)
Chang, Beom-Hwan (호원대학교 컴퓨터학부 사이버보안전공)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.15, no.4, 2019 , pp. 71-84 More about this Journal
Abstract
Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol.
Keywords
Two-Factor Authentication; Security Analysis; Wireless Sensor Networks;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Kumari, Saru, Muhammad Khurram Khan, and Mohammed Atiquzzaman, "User authentication schemes for wireless sensor networks: A review," Ad Hoc Networks, 2015, pp.159-194.   DOI
2 Jiang, Qi, et al, "A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks," International Journal of Network Management, Vol.27, No.3, 2017.
3 Choi, Younsung, et al, "Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, Vol.14, No.6, 2014, pp.10081-10106.   DOI
4 Khan, Muhammad Khurram, and Khaled Alghathbar, "Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'," Sensors, Vol.10, No.3, 2010, pp.2450-2459.   DOI
5 Das, Manik Lal, "Two-factor user authentication in wireless sensor networks," IEEE transactions on wireless communications Vol.8, No.3, 2009, pp.1086-1090.   DOI
6 Chaudhry, Shehzad Ashraf, et al, "An improved and provably secure privacy preserving authentication protocol for SIP," Peer-to-Peer Networking and Applications, Vol.10, No.1, 2017, pp.1-15.   DOI
7 He, Daojing, et al, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad hoc & sensor wireless networks, Vol.10, No.4, 2010, pp.361-371.
8 Yeh, Hsiu-Lien, et al, "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, Vol.11, No.5, 2011, pp.4767-4779.   DOI
9 Shi, Wenbo, and Peng Gong, "A new user authentication protocol for wireless sensor networks using elliptic curves cryptography," International Journal of Distributed Sensor Networks, Vol.9, No.4, 2013.
10 Chen, Tien‐Ho, and Wei‐Kuan Shih, "A robust mutual authentication protocol for wireless sensor networks," ETRI journal, Vol.32, No.5, 2010, pp.704-712.   DOI
11 Choi, Younsung, Youngsook Lee, and Dongho Won, "Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction," International Journal of Distributed Sensor Networks, Vol.12, No.1, 2016.
12 Wang, Ding, et al, "Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment," IEEE Transactions on Dependable and Secure Computing, Vol.12, No.4, 2014, pp.428-442.   DOI
13 Hankerson, Darrel, Alfred J. Menezes, and Scott Vanstone, "Guide to elliptic curve cryptography," Computing Reviews, Vol.46, No.1, 2005.
14 Choi, Younsung, et al, "Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics," The Scientific World Journal, 2014.
15 Jung, Jaewook, et al, "An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks," Sensors, Vol.16, No.8, 2016.
16 박중오, "무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계", 디지털산업정보학회 논문지, 제15권, 제2호, 2019, pp.43-52.
17 이재영, "스마트카드 기반의 사용자 인증 기법에 관한 연구", 디지털산업정보학회 논문지, 제14권, 제2호, 2018, pp.27-33.