期刊论文详细信息
Sensors
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
I-Pin Chang1  Tian-Fu Lee4  Tsung-Hung Lin3  Chuan-Ming Liu2 
[1] Department of Digital Applications, Kang Ning University, Tainan 70970, Taiwan;Department of Computer Science and Information Engineering, National Taipei University of Technology, Taipei 10608, Taiwan;Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung 41170, Taiwan;;Department of Medical Informatics, Tzu Chi University, No. 701, Zhongyang Road, Sec. 3, Hualien 97004, Taiwan
关键词: authentication;    key agreement;    dynamic identity;    wireless sensor networks;    password;    smartcard;   
DOI  :  10.3390/s151229767
来源: mdpi
PDF
【 摘 要 】

Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.

【 授权许可】

CC BY   
© 2015 by the authors; licensee MDPI, Basel, Switzerland.

【 预 览 】
附件列表
Files Size Format View
RO202003190002574ZK.pdf 687KB PDF download
  文献评价指标  
  下载次数:10次 浏览次数:17次