4.7 Article

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

期刊

出版社

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2016.10.001

关键词

Wireless sensor network; Authentication; Key agreement; Privacy; Untraceability; Elliptic curve cryptography; Smart card

资金

  1. National Natural Science Foundation of China [61672413, U1405255, U1536202, 61372075, 61309016, 61472310]
  2. National High Technology Research and Development Program (863 Program) [2015AA016007]
  3. Natural Science Basic Research Plan in Shaanxi Province of China [2016JM6005]
  4. Fundamental Research Funds for the Central Universities [JB161501]
  5. Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)
  6. Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET)
  7. Specific project on research and development platform of Shanghai Science and Technology Committee [14DZ2294400]

向作者/读者索取更多资源

Recently, He et al. proposed an anonymous two-factor authentication scheme following the concept of temporal-credential for wireless sensor networks (WSNs), which is claimed to be secure and capable of withstanding various attacks. However, we reveal that the authentication phase of their scheme has several pitfalls. Firstly, their scheme is susceptible to malicious user impersonation attack, in which a legal but malicious user can impersonate as other registered users. In addition, their scheme is also vulnerable to stolen smart card attack. Furthermore, the scheme cannot provide untraceability and is prone to tracking attack. Then we put forward an untraceable two-factor authentication scheme based on elliptic curve cryptography (ECC) for WSNs. Our new scheme makes up for the missing security features necessary for real-life applications while maintaining the desired features of the original scheme. We prove that the scheme fulfills mutual authentication in the Burrows-Abadi-Needham (BAN) logic. Moreover, by way of informal security analysis, we show that the proposed scheme can resist a variety of attacks and provide more security features than He et al.'s scheme.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据