Journal
SENSORS
Volume 14, Issue 4, Pages 6443-6462Publisher
MDPI AG
DOI: 10.3390/s140406443
Keywords
wireless sensor networks (WSNs); mutual authentication; key agreement; two-factor authentication; passwords; smart cards
Funding
- MSIP(Ministry of Science, ICT and Future Planning), Korea, under the ITRC(Information Technology Research Center) [NIPA-2014-H0301-14-1004]
Ask authors/readers for more resources
User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available