Secure and efficient three-factor protocol for wireless sensor networks

Jihyeon Ryu, Hakjun Lee, Hyoungshick Kim, Dongho Won

Research output: Contribution to journalArticlepeer-review

29 Scopus citations

Abstract

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.'s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.'s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks.

Original languageEnglish
Article number4481
JournalSensors
Volume18
Issue number12
DOIs
StatePublished - 1 Dec 2018

Keywords

  • Biometric
  • Smart card
  • User authentication
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Secure and efficient three-factor protocol for wireless sensor networks'. Together they form a unique fingerprint.

Cite this