Browse > Article
http://dx.doi.org/10.3837/tiis.2017.11.021

An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks  

Li, Jiping (School of Computer and Information Science, Hubei Engineering University)
Ding, Yaoming (School of Computer and Information Science, Hubei Engineering University)
Xiong, Zenggang (School of Computer and Information Science, Hubei Engineering University)
Liu, Shouyin (College of Physical Science and Technology, Central China Normal University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.11, no.11, 2017 , pp. 5556-5573 More about this Journal
Abstract
As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker's own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.
Keywords
Mutual authentication; key-agreement; smart card; password; wireless sensor networks;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 L. Atzori, A. Iera and G. Morabito, "The internet of Things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, June, 2010.   DOI
2 H. Ning, H. Liu and L T. Yang, "Aggregated-proof based hierarchical authentication scheme for the Internet of Things," IEEE trans. on parallel and distribution systems, vol. 26, no. 3, pp. 657-667, March, 2015.   DOI
3 Yoon, E. J., Yoo, K. Y., " Cryptanalysis of robust mutual authentication protocol for wireless sensor networks," in Proc. of the 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing, pp. 392-396, August 18-20, 2011.
4 Yick, J., Mukherjee, B., Ghosal, D., "Wireless sensor network survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, August, 2008.   DOI
5 Wong K. H. M., Zheng, Y., Cao, J., Wang S., "A dynamic user authentication scheme for wireless sensor networks, " In Proc.of the IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, pp. 244-251, June 5-7, 2006.
6 Tseng H. R., Jan R. H., Yang W, "An improved dynamic user authentication scheme for wireless sensor networks," In Proc. of the Global Telecommunications Conference, pp. 986-990, November 26-30, 2007.
7 Das, M. L., "Two-factor user authentication in wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp.1086-1090, March, 2009.   DOI
8 Xu J., Zhu W. T., Feng D. G., "An improved smart card based password authentication scheme with provable security," Computer Standards Interfaces, vol. 31, no. 4, pp. 723-728, June, 2009.   DOI
9 Nyang D. H., Lee M. K., "Improvement of Das's two-factor authentication protocol in wireless sensor networks," IACR Cryptology ePrint Archive, vol. 2009, pp. 1-5, 2009.
10 Khan, M. K., Alghathbar, K., "Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks," Sensors, vol. 10, no. 3, pp.2450-2459, March, 2010.   DOI
11 Chen T. H., Shih W. K., "A robust mutual authentication protocol for wireless sensor networks," Electronic Telecommunication Research Institute, vol. 32, no. 5, pp.704-712, October, 2010.
12 He D, Gao Y., Chan S., Chen C., Bu J., "An enhanced two-factor user authentication scheme in wireless sensor networks, "Ad Hoc Sensor Wireless Networks, vol. 10, no. 4, pp. 361-371, January, 2010.
13 Vaidya B., Makrakis D., Mouftah H., "Two-factor mutual authentication with key agreement in wireless sensor networks," Security and Communication Networks, vol. 9, no. 2, pp. 171-183, April, 2012.
14 Kim J., Lee D., Jeon W., Lee Y. and Won D., "Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks," Sensors, vol. 14, no. 4, pp.6443-6462, April, 2014.   DOI
15 Das A. K., Sharma P., Chatterjee S., Sing J. K., "A dynamic password-based user authentication scheme for hierarchical wireless networks," Journal of Network and Computer Applications, vol. 35, no. 5, pp.1646-1656, September, 2012.   DOI
16 Li C. T., Weng C. Y., Lee C. C., "An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks," Sensors, vol. 13, no. 8, pp.9589-9603, July, 2013.   DOI
17 Yoo, S. G., Lee H., Kim J., "A performance and usability aware secure two-factor user authentication schemes for wireless sensor networks, "International Journal of Distributed Sensor Networks, vol. 2013, no. 2, pp. 543950, January, 2013.
18 I-Pin Chang, Tian-Fu Lee, Tsung-Hung Lin and Chuan-Ming Liu, "Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks," Sensors, vol. 15, no. 12, pp.29841-29854, November, 2015.   DOI
19 Turkanovic M., Holbl M., "An improved dynamic password-based user-authentication scheme for hierarchical wireless sensor networks," Elektronika Ir Elektrotechnika, vol. 19, no. 6, pp. 109-116, June, 2013.
20 Xue K., Ma C., Hong P., Ding R., "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, "Journal of Network and Computer Applications, vol. 36, no. 1, pp. 316-323, January, 2013.   DOI
21 Li Jiping, Ding Yaoming, Xiong Zenggang and Liu Shouyin, "An Improved Biometric-based User Authentication Scheme for C/S system," International Journal of Distributed Sensor Networks, vol. 2014, no. 2, pp. 275341, January, 2014.
22 Honglong Chen, Guoliang Xue and Zhibo Wang, "Efficient and reliable missing tag identificaiton for large-scale RFID systems with unknown tags," IEEE internet of things Journal, vol. 4, no. 3, pp. 736-748, February, 2017.   DOI
23 Debiao He, Neeraj Kumar, Naveen Chilamkurti, "A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks," Information Science, vol. 321, no. 10, pp. 263-277, November, 2015.   DOI
24 Debiao He, Sherali Zeadally, "Authentication protocol for ambient assisted living system," IEEE Communications Magazine, vol. 53, no. 1, pp.71-77, January, 2015.   DOI
25 Honglong Chen and Wei Lou, "On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks," Pervasive and Mobile Computing, vol. 16, Part A, pp. 36-50, January, 2015.   DOI
26 Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang and Qian Wang, "Achieving location error tolerant barrier coverage for wireless sensor networks," Computer Networks, vol. 112, no. 15, pp. 314-328, January, 2017.   DOI
27 Zhibo Wang, Qing Cao, Hairong Qi, Honglong Chen and Qian Wang, "Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks," Ad Hoc Networks, vol. 64, pp. 65-79, September, 2017.   DOI