期刊论文详细信息
ETRI Journal
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
关键词: mutual authentication;    security;    parallel session attack;    hash function;    Wireless sensor networks;   
Others  :  1185892
DOI  :  10.4218/etrij.10.1510.0134
PDF
【 摘 要 】

Authentication is an important service in wireless sensor networks (WSNs) for an unattended environment. Recently, Das proposed a hash-based authentication protocol for WSNs, which provides more security against the masquerade, stolen-verifier, replay, and guessing attacks and avoids the threat which comes with having many logged-in users with the same login-id. In this paper, we point out one security weakness of Das’ protocol in mutual authentication for WSN’s preservation between users, gateway-node, and sensor nodes. To remedy the problem, this paper provides a secrecy improvement over Das’ protocol to ensure that a legal user can exercise a WSN in an insecure environment. Furthermore, by presenting the comparisons of security, computation and communication costs, and performances with the related protocols, the proposed protocol is shown to be suitable for higher security WSNs.

【 授权许可】

   

【 预 览 】
附件列表
Files Size Format View
20150520115415496.pdf 763KB PDF download
【 参考文献 】
  • [1]I.F. Akyildiz et al., "A Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102-114.
  • [2]IEEE Standards for 802.15.4, Part 15, Amendment 4, "Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks," 2003.
  • [3]N. Sastry and D. Wagner, "Security Considerations for IEEE 802.15.4 Networks," Proc. ACM Workshop Wireless Security, ACM Press, 2004, pp. 32-42.
  • [4]R. Watro et al., "C. Lynn, and P. Kruus, TinyPK: Securing Sensor Networks with Public Key Technology," Proc. ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 59-64.
  • [5]K. Wong et al., "A Dynamic User Authentication Scheme for Wireless Sensor Networks," Proc. IEEE Int. Conf. Sensor Netw., Ubiquitous, Trustworthy Computing, 2006, pp. 244-251.
  • [6]M.L. Das, "Two-Factor User Authentication in Wireless Sensor Networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, 2009, pp. 1086-1090.
  • [7]H.R. Tseng, R.H. Jan, and W. Yang, "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks," IEEE Global Telecommun. Conf., 2007, pp. 986-990.
  • [8]S. Tripathy and S. Nandi, "Defense Against Outside Attacks in Wireless Sensor Networks," Computer Commun., vol. 31, no. 4, 2008, pp. 818-826.
  • [9]B. Vaidya, M. Chen, and J. Rodrigues, "Improved Robust User Authentication Scheme for Wireless Sensor Networks," 5th IEEE Proc. Wireless Commun. Sensor Networks, 2009, pp. 1-6.
  • [10]X. Duan, J.W. Liu, and Q. Zhang, "Security Improvement on Chien Et Al.'s Remote User Authentication Scheme Using Smart Cards," IEEE Int. Conf. Computational Intell. Secur., 2006, pp. 1133-1135.
  • [11]C.H. Han and W.K. Shih, "Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment," Comput. Stand. Interfaces, vol. 31, no. 6, Nov. 2009, pp. 1118-1123.
  • [12]S. Halevi and H. Krawczyk, "Public-Key Cryptography and Password Protocols," ACM Trans. Inf. Syst. Secur., vol. 2, no. 3, 1999, pp. 230-268.
  • [13]G. Yang et al., "Two-Factor Mutual Authentication Based on Smart Cards and Passwords," J. Comput. Syst. Sci., vol. 74, no. 7, 2008, pp. 1160-1172.
  • [14]H.Y. Chien, J.K. Jan, and Y.M. Tseng, "An Efficient and Practical Solution to Remote Authentication: Smart Card," Computers & Security, vol. 21, no. 4, 2002, pp. 372-375.
  • [15]D. Dolev and A.C. Yao, "On the Security of Public-Key Protocols," IEEE Trans. Inform. Theory, vol. 29, no. 2, 1983, pp. 198-208.
  • [16]Hsiang and W.K. Shih, "Weaknesses and Improvements of the Yoon-Ryu-Yoo Remote User Authentication Scheme Using Smart Cards," Computer Commun., vol. 32, no. 4, 2009, pp. 649-652.
  • [17]P.C. Kocher, J. Jaffe, and B. Jun., "Differential Power Analysis," Proc. Advances Cryptology, LNCS, 1666, Springer-Verlag, 1999, pp. 388-397.
  • [18]T.H. Chen, H.C. Hsiang, and W.K. Shih, "Security Enhancement on an Improvement on Two Remote User Authentication Schemes Using Smart Cards," Future Gen. Comput. Syst., Accepted, doi: 10.1016/j.future.2010.08.007. 2010.
  文献评价指标  
  下载次数:10次 浏览次数:24次