Security analysis of 'two-factor user authentication in wireless sensor networks'

  • Authors:
  • Muhammad Khurram Khan;Khaled Alghathbar

  • Affiliations:
  • Center of Excellence in Information Assurance, King Saud University, Saudi Arabia and Information Systems Department, College of Computer and Information Sciences, King Saud University, Saudi Arab ...;Information Systems Department, College of Computer and Information Sciences, King Saud University, Saudi Arabia

  • Venue:
  • AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
  • Year:
  • 2010

Quantified Score

Hi-index 0.01

Visualization

Abstract

Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to their un-attended and hostile deployments. Usually, sensor nodes are equipped with limited computing power, storage, and communication module, thus authenticating remote users in such resource-constrained environment is a critical security concern. Recently, M.L Das proposed a two-factor user authentication scheme in WSN and claimed that his scheme is secure against different kind of attacks. However, in this paper, we prove that M.L Das-scheme has some critical security pitfalls and is not recommended for real application. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack.