Cryptanalysis and improvement of an ECC-based authentication protocol for wireless sensor networks

Taeui Song, Dongwoo Kang, Jihyeon Ryu, Hyoungshick Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

The Internet of Things is the interconnection of devices that exchange collected data with each other through the internet using electronics, software, and sensors. Wireless sensor network is used extensively in implementation of the Internet of Things system. With the increasing use of them, many researchers have focused on the security in wireless sensor network environment. In 2016, Wu et al. proposed a user authentication protocol for wireless sensor network, claiming it was secure from various types of attacks. However, we found out that their scheme has some vulnerabilities to the user impersonation attack, and the denial of service attack. In order to overcome these problems, we review Wu et al.’s protocol and propose an improved protocol based on their protocol. Then, we show that our proposed protocol is more secure than other authentication protocols for wireless sensor network.

Original languageEnglish
Title of host publicationComputational Science and Its Applications – ICCSA 2018 - 18th International Conference, 2018, Proceedings
EditorsEufemia Tarantino, Beniamino Murgante, David Taniar, Yeonseung Ryu, Carmelo M. Torre, Ana Maria Rocha, Osvaldo Gervasi, Sanjay Misra, Elena Stankova, Bernady O. Apduhan
PublisherSpringer Verlag
Pages50-61
Number of pages12
ISBN (Print)9783319951645
DOIs
StatePublished - 2018
Event18th International Conference on Computational Science and Its Applications, ICCSA 2018 - Melbourne, Australia
Duration: 2 Jul 20185 Jul 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10961 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Conference on Computational Science and Its Applications, ICCSA 2018
Country/TerritoryAustralia
CityMelbourne
Period2/07/185/07/18

Keywords

  • Authentication
  • Elliptic curve cryptography
  • Internet of Things
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Cryptanalysis and improvement of an ECC-based authentication protocol for wireless sensor networks'. Together they form a unique fingerprint.

Cite this