| Literature DB >> 22294935 |
Muhammad Khurram Khan1, Khaled Alghathbar.
Abstract
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.Entities:
Keywords: authentication; cryptanalysis; security; smart card; wireless sensor network
Mesh:
Year: 2010 PMID: 22294935 PMCID: PMC3264488 DOI: 10.3390/s100302450
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Performance analysis and comparison of the proposed scheme.
| Securely change/update password | Yes | No | No |
| Protection against insider’s attack | Yes | No | No |
| Protection against Gateway node bypassing attack | Yes | No | No |
| Mutual authentication between GW and sensor nodes | Yes | No | Yes |
| Computational operations in registration phase | 3H | 2H | 2H |
| Computational operations in login phase | 3H | 3H | 3H |
| Computational operations in verification phase | 7H | 5H | 12H |
H: The computational cost of one hash operation