4.6 Article

Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.2974220

关键词

Wireless sensor networks; Authentication; Protocols; Resists; Systematics; Logic gates; User authentication; node capture attacks; wireless sensor networks

资金

  1. National Key Research and Development Plan of China [2018YFB0803605]
  2. National Natural Science Foundation of China [61802006]
  3. National Research Foundation, PrimeMinister's Office, Singapore under its Strategic Capability Research Centres Funding Initiative
  4. Singapore Ministry of Education [MOE2016-T2-2-014(S)]

向作者/读者索取更多资源

Despite years of research, designing a practical multi-factor user authentication scheme for wireless sensor networks is still challenging due to the security versus efficiency dilemma. Common security failures include smart card loss attacks and node capture attacks, with the latter receiving less attention compared to the former. This article systematically explores node capture attacks, providing insights for secure user authentication scheme design in WSNs.
Despite decades of intensive research, it is still challenging to design a practical multi-factor user authentication scheme for wireless sensor networks (WSNs). This is because protocol designers are confronted with a long-standing security versus efficiency dilemma: sensor nodes are lightweight devices with limited storage and computation capabilities, while the security requirements are demanding as WSNs are generally deployed for sensitive applications. Hundreds of proposals have been proposed, yet most of them have been found to be problematic, and the same mistakes are repeated again and again. Two of the most common security failures are regarding smart card loss attacks and node capture attacks. The former has been extensively investigated in the literature, while little attention has been given to understanding the node capture attacks. To alleviate this undesirable situation, this article takes a substantial step towards systematically exploring node capture attacks against multi-factor user authentication schemes for WSNs. We first investigate the various causes and consequences of node capture attacks, and classify them into ten different types in terms of the attack targets, adversary's capabilities and vulnerabilities exploited. Then, we elaborate on each type of attack through examining 11 typical vulnerable protocols, and suggest corresponding countermeasures. Finally, we conduct a large-scale comparative measurement of 61 representative user authentication schemes for WSNs under our extended evaluation criteria. We believe that such a systematic understanding of node capture attacks would help design secure user authentication schemes for WSNs.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据