An improved and provably secure three-factor user authentication scheme for wireless sensor networks

Peer-to-Peer Networking and Applications - Tập 11 Số 1 - Trang 1-20 - 2018
Fan Wu1, Lanqing Xu2, Saru Kumari3, Xiong Li4,5
1Department of Computer Science and Engineering, Xiamen Institute of Technology, Xiamen, China
2School of Information Science and Technology, Xiamen University, Xiamen, China
3Department of Mathematics, Chaudhary Charan Singh University, Meerut, India
4Nanjing University of Information Science and Technology, Nanjing, China
5School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China

Tóm tắt

Từ khóa


Tài liệu tham khảo

Abdalla M, Izabachene M, Pointcheval D (2008) Anonymous and transparent gateway-based password-authenticated key exchange. Springer, pp 133–148

Althobaiti O, Al-Rodhaan M, Al-Dhelaan A (2013) An efficient biometric authentication protocol for wireless sensor networks. Int J Distrib Sensor Netw 2013

Blanchet B, Allamigeon X, Smyth B Online demo for proverif. http://proverif.rocq.inria.fr/index.php

Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on computer and communications security. ACM, pp 241–250

Chen T H, Shih W K (2010) A robust mutual authentication protocol for wireless sensor networks. Etri J 32(5):704–712

Das A K (2014) Cryptanalysis of an efficient biometric authentication protocol for wireless sensor networks. Springer, pp 1–9

Das AK (2014) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. In: Peer-to-Peer Netw Appl, pp 1–22. doi: 10.1007/s12083-014-0324-9

Das AK (2015) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst. doi: 10.1002/dac.2933

Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. In: Wirel Pers Commun, pp 1–28. doi: 10.1007/s11277-015-2288-3

Das M L (2009) Two-factor user authentication in wireless sensor networks. IEEE T Wirel Commun 8 (3):1086–1090

Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in cryptology-Eurocrypt 2004. Springer, pp 523–540

Dolev D, Yao A C (1983) On the security of public key protocols. IEEE T Inform Theory 29(2):198–208

Fan C I, Lin Y H (2009) Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE T Inform Forensics Secur 4(4):933–945

Guo P, Wang J, Geng X H, Kim C S, Kim J U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J. Int. Technol. 15(6):929–935

He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wirel Netw 10(4):361–371

Jiang Q, Ma J, Lu X, Tian Y (2014) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw Appl:1–12. doi: 10.1007/s12083-014-0285-z

Kang H, Hori Y, Katashita T, Hagiwara M, Iwamura K (2014) Cryptographie key generation from puf data using efficient fuzzy extractors. In: 2014 16th International conference on advanced communication technology (ICACT). IEEE, pp 23–26

Khan M K, Alghathbar K (2010) Cryptanalysis and security improvements of ’two-factor user authentication in wireless sensor networks’. Sensors 10(3):2450–2459

Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology-CRYPTO 99. Springer, pp 388–397

Kumar P, Lee H J (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: Wireless advanced (WiAd), 2011. IEEE, pp 241–245

Lee J, Ryu S, Yoo K (2002) Fingerprint-based remote user authentication scheme using smart cards. Electron Lett 38(12):554–555

Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Modell 58(1): 85–95

Li X, Niu J, Khan M K, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371

Li X, Niu J W, Ma J, Wang W D, Liu C L (2011) Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 34(1):73–79

Li X, Xiong Y, Ma J, Wang W (2012) An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J Netw Comput Appl 35(2):763–769

Liu Z, Wenger E, Gro β schä dl J (2014) Mote-ecc: Energy-scalable elliptic curve cryptography for wireless-sensor-networks. In: Boureanu I, Owesarski P, Vaudenay S (eds) Applied cryptography and network security, lecture notes in computer science, vol 8479. Springer International Publishing, pp 361–379, DOI 10.1007/978-3-319-07536-5_22

Mangard S, Oswald E, Standaert F X (2011) One for all call for one: Unifying standard differential power analysis attacks. IET Inform Secur 5(2):100–110

Messerges T S, Dabbish E A, Sloan R H (2002) Examining smart-card security under the threat of power analysis attacks. IEEE T Comput 51(5):541–552

Pointcheval D, Zimmer S (2008) Multi-factor authenticated key exchange. In: Applied cryptography and network security. Springer, pp 277–295

Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1–15

Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: Securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM, pp 59–64

Wu F, Xu L (2013) Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J Med Syst 37(4). doi: 10.1007/s10916-013-9958-z

Wu F, Xu L, Kumari S, Li X (2015) A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw Appl. doi: 10.1007/s12083-015-0404-5

Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks. Comput Electr Eng 45:274–285

Xu L, Wu F (2014) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst. 10.1007/s10916-014-0179-x

Xu L, Wu F (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260. doi: 10.1002/sec.977

Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323

Yeh H L, Chen T H, Liu P C, Kim T H, Wei H W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779

Yoon E J, Yoo K Y (2011) A new biometric-based user authentication scheme without using password for wireless sensor networks. In: 2011 20th IEEE international workshops on enabling technologies: Infrastructure for collaborative enterprises (WETICE). IEEE, pp 279–284

Yuan J, Jiang C, Jiang Z (2010) A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 15(3):272–276