An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:KSII transactions on Internet and information systems 2017-11, Vol.11 (11), p.5556-5573
Hauptverfasser: Li, Jiping, Ding, Yaoming, Xiong, Zenggang, Liu, Shouyin
Format: Artikel
Sprache:kor
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5573
container_issue 11
container_start_page 5556
container_title KSII transactions on Internet and information systems
container_volume 11
creator Li, Jiping
Ding, Yaoming
Xiong, Zenggang
Liu, Shouyin
description As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker’s own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.
format Article
fullrecord <record><control><sourceid>kiss_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO201707153701941</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><kiss_id>3564353</kiss_id><sourcerecordid>3564353</sourcerecordid><originalsourceid>FETCH-LOGICAL-k501-492da119d3073df41dea27f11f5ef7f6c9446d2c5c50e95a65ea4624e047bd383</originalsourceid><addsrcrecordid>eNpNjE9LwzAchoMoOOY-gZdcPBbyP-2xDKdz0x028Fiy5lcX2qYjySz79g4m4ul9eHl4btCEFlplmml9-4_v0SxGtyeU5UyJPJ-gfenxsj-G4Rss3o1DtjB1GgJ-P6WT6XB5SgfwydUmucHjbX2AHvDo0gGv4IzLrwCXwyfsPP50ATqIEW_Bx0viA9I4hDY-oLvGdBFmvztFu8Xzbv6arTcvy3m5zlpJaCYKZg2lheVEc9sIasEw3VDaSGh0o-pCCGVZLWtJoJBGSTBCMQFE6L3lOZ-ip2u2dTG5ytvYVW_lasMI1URTyTWhhaAX7_HPi9UxuN6Ec8WlElxy_gPjnlrk</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Li, Jiping ; Ding, Yaoming ; Xiong, Zenggang ; Liu, Shouyin</creator><creatorcontrib>Li, Jiping ; Ding, Yaoming ; Xiong, Zenggang ; Liu, Shouyin</creatorcontrib><description>As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker’s own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><language>kor</language><publisher>한국인터넷정보학회</publisher><subject>key-agreement ; Mutual authentication ; password ; smart card ; wireless sensor networks</subject><ispartof>KSII transactions on Internet and information systems, 2017-11, Vol.11 (11), p.5556-5573</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,315,781,785,886</link.rule.ids></links><search><creatorcontrib>Li, Jiping</creatorcontrib><creatorcontrib>Ding, Yaoming</creatorcontrib><creatorcontrib>Xiong, Zenggang</creatorcontrib><creatorcontrib>Liu, Shouyin</creatorcontrib><title>An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks</title><title>KSII transactions on Internet and information systems</title><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><description>As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker’s own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.</description><subject>key-agreement</subject><subject>Mutual authentication</subject><subject>password</subject><subject>smart card</subject><subject>wireless sensor networks</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>JDI</sourceid><recordid>eNpNjE9LwzAchoMoOOY-gZdcPBbyP-2xDKdz0x028Fiy5lcX2qYjySz79g4m4ul9eHl4btCEFlplmml9-4_v0SxGtyeU5UyJPJ-gfenxsj-G4Rss3o1DtjB1GgJ-P6WT6XB5SgfwydUmucHjbX2AHvDo0gGv4IzLrwCXwyfsPP50ATqIEW_Bx0viA9I4hDY-oLvGdBFmvztFu8Xzbv6arTcvy3m5zlpJaCYKZg2lheVEc9sIasEw3VDaSGh0o-pCCGVZLWtJoJBGSTBCMQFE6L3lOZ-ip2u2dTG5ytvYVW_lasMI1URTyTWhhaAX7_HPi9UxuN6Ec8WlElxy_gPjnlrk</recordid><startdate>20171130</startdate><enddate>20171130</enddate><creator>Li, Jiping</creator><creator>Ding, Yaoming</creator><creator>Xiong, Zenggang</creator><creator>Liu, Shouyin</creator><general>한국인터넷정보학회</general><scope>HZB</scope><scope>Q5X</scope><scope>JDI</scope></search><sort><creationdate>20171130</creationdate><title>An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks</title><author>Li, Jiping ; Ding, Yaoming ; Xiong, Zenggang ; Liu, Shouyin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k501-492da119d3073df41dea27f11f5ef7f6c9446d2c5c50e95a65ea4624e047bd383</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2017</creationdate><topic>key-agreement</topic><topic>Mutual authentication</topic><topic>password</topic><topic>smart card</topic><topic>wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Jiping</creatorcontrib><creatorcontrib>Ding, Yaoming</creatorcontrib><creatorcontrib>Xiong, Zenggang</creatorcontrib><creatorcontrib>Liu, Shouyin</creatorcontrib><collection>Korean Studies Information Service System (KISS)</collection><collection>Korean Studies Information Service System (KISS) B-Type</collection><collection>KoreaScience</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Jiping</au><au>Ding, Yaoming</au><au>Xiong, Zenggang</au><au>Liu, Shouyin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><date>2017-11-30</date><risdate>2017</risdate><volume>11</volume><issue>11</issue><spage>5556</spage><epage>5573</epage><pages>5556-5573</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker’s own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.</abstract><pub>한국인터넷정보학회</pub><tpages>18</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1976-7277
ispartof KSII transactions on Internet and information systems, 2017-11, Vol.11 (11), p.5556-5573
issn 1976-7277
1976-7277
language kor
recordid cdi_kisti_ndsl_JAKO201707153701941
source EZB-FREE-00999 freely available EZB journals
subjects key-agreement
Mutual authentication
password
smart card
wireless sensor networks
title An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T00%3A05%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kiss_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Improved%20Two-Factor%20Mutual%20Authentication%20Scheme%20with%20Key%20Agreement%20in%20Wireless%20Sensor%20Networks&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Li,%20Jiping&rft.date=2017-11-30&rft.volume=11&rft.issue=11&rft.spage=5556&rft.epage=5573&rft.pages=5556-5573&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/&rft_dat=%3Ckiss_kisti%3E3564353%3C/kiss_kisti%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_kiss_id=3564353&rfr_iscdi=true