Cryptanalysis of Kim Jiye et al.'s Two-Factor Mutual Authentication with Key Agreement in WSNs

نویسندگان

  • Jiping Li
  • Yaoming Ding
  • Zenggang Xiong
  • Shouyin Liu
  • Honglai Li
چکیده

—User authentication and key management play an important role in the security of WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from dedicated sensors. For this case, several user authentication schemes have been proposed in recent years. Among these schemes, Kim Jiye et. al’s scheme is very novel. However, in the current work, we find that Kim Jiye et. al’s scheme is still vulnerable to some attacks such as offline password guessing attack, user impersonation attack using his/her own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we give detailed cryptanalysis of Kim Jiye et. al’s two-factor mutual authentication with key agreement in WSNs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first prop...

متن کامل

Cryptanalysis of Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System

A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An’s scheme provides more improved user authentication than Das’s scheme. But An’s scheme is not secure against denial of service attack in login phase, forgery attack. Li et al. pointed out them and proposed three-factor remote user authentication sc...

متن کامل

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway nod...

متن کامل

Cryptanalysis on Privacy-Aware Two-Factor Authentication Protocol for Wireless Sensor Networks

Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied twofactor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been prop...

متن کامل

Cryptanalysis and Improvements of an Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks

In wireless environments, the issue of mutual authentication and key agreement with user anonimity is challenging. Recently, Mun et al. proposed an efficient anonymous authentication scheme for roaming services in wireless enviroments. Unfortunately, Kim et al. pointed out that Mun et al.’s anonymous authentication scheme suffers from replay attacks and man-in-the-middle attacks. They propose a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCM

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2016