Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks

Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway...

Full description

Bibliographic Details
Main Authors: Yung-Cheng Lee, Hsin-Yu Lai, Pei-Ju Lee
Format: Article
Language:English
Published: Taiwan Association of Engineering and Technology Innovation 2012-10-01
Series:International Journal of Engineering and Technology Innovation
Subjects:
Online Access:http://ojs.imeti.org/index.php/IJETI/article/view/70
id doaj-f3ab4f6d43714801b07773de8388c7b0
record_format Article
spelling doaj-f3ab4f6d43714801b07773de8388c7b02020-11-24T20:58:33ZengTaiwan Association of Engineering and Technology InnovationInternational Journal of Engineering and Technology Innovation2223-53292226-809X2012-10-0124Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor NetworksYung-Cheng LeeHsin-Yu LaiPei-Ju LeeWireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to remedy the flaws. The improved scheme withstands the replay attack and off-line guessing attack, and the users can freely update their passwords via public channels.http://ojs.imeti.org/index.php/IJETI/article/view/70wireless sensor networksauthenticationguessing attackimpersonation attack
collection DOAJ
language English
format Article
sources DOAJ
author Yung-Cheng Lee
Hsin-Yu Lai
Pei-Ju Lee
spellingShingle Yung-Cheng Lee
Hsin-Yu Lai
Pei-Ju Lee
Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
International Journal of Engineering and Technology Innovation
wireless sensor networks
authentication
guessing attack
impersonation attack
author_facet Yung-Cheng Lee
Hsin-Yu Lai
Pei-Ju Lee
author_sort Yung-Cheng Lee
title Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
title_short Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
title_full Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
title_fullStr Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
title_full_unstemmed Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
title_sort cryptanalysis and improvement of the robust user authentication scheme for wireless sensor networks
publisher Taiwan Association of Engineering and Technology Innovation
series International Journal of Engineering and Technology Innovation
issn 2223-5329
2226-809X
publishDate 2012-10-01
description Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to remedy the flaws. The improved scheme withstands the replay attack and off-line guessing attack, and the users can freely update their passwords via public channels.
topic wireless sensor networks
authentication
guessing attack
impersonation attack
url http://ojs.imeti.org/index.php/IJETI/article/view/70
work_keys_str_mv AT yungchenglee cryptanalysisandimprovementoftherobustuserauthenticationschemeforwirelesssensornetworks
AT hsinyulai cryptanalysisandimprovementoftherobustuserauthenticationschemeforwirelesssensornetworks
AT peijulee cryptanalysisandimprovementoftherobustuserauthenticationschemeforwirelesssensornetworks
_version_ 1716785533475094528