An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
Muhamed Turkanović,Marko Hölbl +1 more
Reads0
Chats0
TLDR
This paper presents a flaw in Das et al.Abstract:
User authentication is an important issue in wireless sensor networks (WSN). Das et al. recently proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks (HWSN), which provides high security and a simple authentication approach. In this paper we present a flaw in Das et al.’s scheme that makes it infeasible for real-life implementation. Additionally, we demonstrate that Das et al.’s scheme has redundant elements. To overcome these imperfections we propose an enhanced user authentication scheme based on Das et al.’s, which is both efficient and secure. DOI: http://dx.doi.org/10.5755/j01.eee.19.6.2038read more
Citations
More filters
Journal ArticleDOI
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
TL;DR: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks is proposed, which ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user.
Journal ArticleDOI
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
TL;DR: This paper focuses on overcoming the security weaknesses of Turkanovic et?al.'s scheme, by proposing a new and improved UAKAS which enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKas.
Journal ArticleDOI
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Chin-Chen Chang,Hai-Duong Le +1 more
TL;DR: This work found that Turkanovic et al.'s smart card-based authentication scheme is vulnerable to impersonation attack with node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy.
Journal ArticleDOI
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Ruhul Amin,G. P. Biswas +1 more
TL;DR: The proposed protocol not only resists the above mentioned security weaknesses, but also achieves complete security requirements including specially energy efficiency, user anonymity, mutual authentication and user-friendly password change phase.
Journal ArticleDOI
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
TL;DR: The main intention of this paper is to design an efficient and robust smartcard-based user authentication and session key agreement protocol for wireless sensor networks that use the Internet of Things, and its security is analyzed, proving that it overcomes the weaknesses of Farash et?al.'s protocol.
References
More filters
Journal ArticleDOI
Wireless sensor networks: a survey
TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Secure routing in wireless sensor networks: attacks and countermeasures
Chris Karlof,David Wagner +1 more
TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.