A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing

碩士 === 中國文化大學 === 資訊管理學系 === 106 === With the rapid development of the network. Internet of things (IoT) and Wireless Sensor Network (WSN) widely used in a variety of services such as the smart house, healthcare and monitor management. Nowadays, in almost an era smartphone, users can quickly and con...

Full description

Bibliographic Details
Main Authors: LEE, YU-WEI, 李祐瑋
Other Authors: YU, PING
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/8bgjej
Description
Summary:碩士 === 中國文化大學 === 資訊管理學系 === 106 === With the rapid development of the network. Internet of things (IoT) and Wireless Sensor Network (WSN) widely used in a variety of services such as the smart house, healthcare and monitor management. Nowadays, in almost an era smartphone, users can quickly and conveniently connect their device to the IoT node for supervision or management. To protect user information, the remote user authentication scheme of IoT becomes more critical.The past two-factor authentication based on passwords and smart cards is easier to attack. Many scholars proposed their schemes that are three-factors authentications based on the password, smart card, and biometric. Among them, Dhillon et al. proposed a lightweight biometrics based remote user authentication scheme. However, we found that Dhillon et al. authentication has several flaws such as stolen/lost smart device attacks, impersonation attacks, denial-of-service attacks, parallel session attacks, and no user anonymity. In addition, Jiang et al. improved Amin et al.'s three-factor authentication scheme for WSN and proposed a remote user authentication scheme based on the Rabin cryp-tosystem. We also found that their scheme has suffered IoT node impersonation attacks and session key attacks.In this study, we also propose a light improved protocol of Dhillon et al.'s scheme to increase the security that can prevent possible security attack of theirs. After security and efficiency analysis, we can find that the proposed scheme will be more suitable for remote user authentication of wireless sensor networks in the context of the Internet of Thing.