Cryptanalysis of improved and provably secure three-factor user authentication scheme for wireless sensor networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Wireless sensor networks are applied in various areas like smart grid, environmental monitoring, health care, and security and surveillance. It applies to many fields, but as the utilization is higher, security becomes more important. Recently, the authentication scheme for the environment of wireless sensor network has also been studied. Wu et al. has announced a three-factor user authentication scheme claiming to be resistant to different types of attacks and maintain various security attributes. However, their proposal has several fatal vulnerabilities. First, it is vulnerable to the outsider attack. Second, it is exposed to user impersonation attack. Third, it does not satisfy user anonymity. Therefore, in this paper, we describe these vulnerabilities and prove Wu et al.’s scheme is unsafe.

Original languageEnglish
Title of host publicationComputational Science and Technology - 5th ICCST 2018
EditorsRayner Alfred, Ag Asri Ag Ibrahim, Yuto Lim, Patricia Anthony
PublisherSpringer Verlag
Pages49-58
Number of pages10
ISBN (Print)9789811326219
DOIs
StatePublished - 2019
Event5th International Conference on Computational Science and Technology, ICCST 2018 - Kota Kinabalu, Malaysia
Duration: 29 Aug 201830 Aug 2018

Publication series

NameLecture Notes in Electrical Engineering
Volume481
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference5th International Conference on Computational Science and Technology, ICCST 2018
Country/TerritoryMalaysia
CityKota Kinabalu
Period29/08/1830/08/18

Keywords

  • Biometric
  • Elliptic curve cryptosystem
  • Remote user authentication
  • Wireless sensor Network

Fingerprint

Dive into the research topics of 'Cryptanalysis of improved and provably secure three-factor user authentication scheme for wireless sensor networks'. Together they form a unique fingerprint.

Cite this