Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Taiwan Association of Engineering and Technology Innovation
2012-10-01
|
Series: | International Journal of Engineering and Technology Innovation |
Subjects: | |
Online Access: | http://ojs.imeti.org/index.php/IJETI/article/view/70 |
id |
doaj-f3ab4f6d43714801b07773de8388c7b0 |
---|---|
record_format |
Article |
spelling |
doaj-f3ab4f6d43714801b07773de8388c7b02020-11-24T20:58:33ZengTaiwan Association of Engineering and Technology InnovationInternational Journal of Engineering and Technology Innovation2223-53292226-809X2012-10-0124Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor NetworksYung-Cheng LeeHsin-Yu LaiPei-Ju LeeWireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to remedy the flaws. The improved scheme withstands the replay attack and off-line guessing attack, and the users can freely update their passwords via public channels.http://ojs.imeti.org/index.php/IJETI/article/view/70wireless sensor networksauthenticationguessing attackimpersonation attack |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yung-Cheng Lee Hsin-Yu Lai Pei-Ju Lee |
spellingShingle |
Yung-Cheng Lee Hsin-Yu Lai Pei-Ju Lee Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks International Journal of Engineering and Technology Innovation wireless sensor networks authentication guessing attack impersonation attack |
author_facet |
Yung-Cheng Lee Hsin-Yu Lai Pei-Ju Lee |
author_sort |
Yung-Cheng Lee |
title |
Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks |
title_short |
Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks |
title_full |
Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks |
title_fullStr |
Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks |
title_full_unstemmed |
Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks |
title_sort |
cryptanalysis and improvement of the robust user authentication scheme for wireless sensor networks |
publisher |
Taiwan Association of Engineering and Technology Innovation |
series |
International Journal of Engineering and Technology Innovation |
issn |
2223-5329 2226-809X |
publishDate |
2012-10-01 |
description |
Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to remedy the flaws. The improved scheme withstands the replay attack and off-line guessing attack, and the users can freely update their passwords via public channels. |
topic |
wireless sensor networks authentication guessing attack impersonation attack |
url |
http://ojs.imeti.org/index.php/IJETI/article/view/70 |
work_keys_str_mv |
AT yungchenglee cryptanalysisandimprovementoftherobustuserauthenticationschemeforwirelesssensornetworks AT hsinyulai cryptanalysisandimprovementoftherobustuserauthenticationschemeforwirelesssensornetworks AT peijulee cryptanalysisandimprovementoftherobustuserauthenticationschemeforwirelesssensornetworks |
_version_ |
1716785533475094528 |