On the security and improvement of a two-factor user authentication scheme in wireless sensor networks

  • Authors:
  • Da-Zhi Sun;Jian-Xin Li;Zhi-Yong Feng;Zhen-Fu Cao;Guang-Quan Xu

  • Affiliations:
  • School of Computer Science and Technology, Tianjin University, Tianjin, People's Republic of China 300072;School of Computer Science and Engineering, Beihang University, Beijing, People's Republic of China 100191;School of Computer Science and Technology, Tianjin University, Tianjin, People's Republic of China 300072;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, People's Republic of China 200240;School of Computer Science and Technology, Tianjin University, Tianjin, People's Republic of China 300072

  • Venue:
  • Personal and Ubiquitous Computing
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

User authentication is a basic security requirement during the deployment of the wireless sensor network (WSN), because it may operate in a rather hostile environment, such as a military battlefield. In 2010, Khan and Alghathbar (KA) found out that Das's two-factor user authentication scheme for WSNs is vulnerable to the gateway node (GW-node) bypassing attack and the privileged-insider attack. They further presented an improved scheme to overcome the security flaws of Das's scheme. However, in this paper, we show that KA's scheme still suffers from the GW-node impersonation attack, the GW-node bypassing attack, and the privileged-insider attack. Hence, to fix the security flaws in KA's scheme, we propose a new user authentication scheme for WSNs. The security of the user authentication session in the proposed scheme is reduced by the model of Bellare and Rogaway. The security of partial compromise of secrets in the proposed scheme is reduced and analyzed by our adversarial model. Based on the performance evaluation, the overall cost of the proposed scheme is less than that of KA's scheme. Hence, we believe that the proposed scheme is more suitable for real security applications than KA's scheme.