Literature DB >> 31653025

Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.

Km Renuka1, Sachin Kumar2, Saru Kumari3, Chien-Ming Chen4.   

Abstract

Wireless sensor networks (WSNs) are of prominent use in unmanned surveillance applications. This peculiar trait of WSNs is actually the underlying technology of various applications of the Internet of Things (IoT) such as smart homes, smart cities, smart shopping complexes, smart traffic, smart health, and much more. Over time, WSNs have evolved as a strong base for laying the foundations of IoT infrastructure. In order to address the scenario in which a user wants to access the real-time data directly from the sensor node in wireless sensor networks (WSNs), Das recently proposed an anonymity-preserving three-factor authentication protocol. Das's protocol is suitable for resource-constrained sensor nodes because it only uses lightweight cryptographic primitives such as hash functions and symmetric encryption schemes as building blocks. Das's protocol is claimed to be secure against different known attacks by providing formal security proof and security verification using the Automated Validation of Internet Security Protocols and Applications tool. However, we find that Das's protocol has the following security loopholes: (1) By using a captured sensor node, an adversary can impersonate a legal user to the gateway node, impersonate other sensor nodes to deceive the user, and the adversary can also decrypt all the cipher-texts of the user; (2) the gateway node has a heavy computational cost due to user anonymity and thus the protocol is vulnerable to denial of service (DoS) attacks. We overcome the shortcomings of Das's protocol and propose an improved protocol. We also prove the security of the proposed protocol in the random oracle model. Compared with the other related protocols, the improved protocol enjoys better functionality without much enhancement in the computation and communication costs. Consequently, it is more suitable for applications in WSNs.

Entities:  

Keywords:  anonymity; fuzzy extractor; multi-factor authentication; provably security; wireless sensor networks

Year:  2019        PMID: 31653025     DOI: 10.3390/s19214625

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


  6 in total

1.  Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks.

Authors:  Alice May-Kuen Wong; Chien-Lung Hsu; Tuan-Vinh Le; Mei-Chen Hsieh; Tzu-Wei Lin
Journal:  Sensors (Basel)       Date:  2020-04-29       Impact factor: 3.576

2.  Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by PSO.

Authors:  Xiaopeng Tan; Shaojing Su; Zhen Zuo; Xiaojun Guo; Xiaoyong Sun
Journal:  Sensors (Basel)       Date:  2019-12-14       Impact factor: 3.576

3.  SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks.

Authors:  SungJin Yu; YoungHo Park
Journal:  Sensors (Basel)       Date:  2020-07-25       Impact factor: 3.576

4.  A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems.

Authors:  Jihyeon Ryu; Dongwoo Kang; Hakjun Lee; Hyoungshick Kim; Dongho Won
Journal:  Sensors (Basel)       Date:  2020-12-12       Impact factor: 3.576

5.  Low-Rate DoS Attacks Detection Based on MAF-ADM.

Authors:  Sijia Zhan; Dan Tang; Jianping Man; Rui Dai; Xiyin Wang
Journal:  Sensors (Basel)       Date:  2019-12-29       Impact factor: 3.576

6.  A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.

Authors:  Charalampos Stamatellis; Pavlos Papadopoulos; Nikolaos Pitropakis; Sokratis Katsikas; William J Buchanan
Journal:  Sensors (Basel)       Date:  2020-11-18       Impact factor: 3.576

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.