Skip to main content

Cryptanalysis of Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks

  • Conference paper
Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 330))

Abstract

Recently, wireless sensor networks can provide a practicable real-time monitoring system because wireless sensors can be easily deployed in various environments. To provide secure and efficient communication, various user authentication schemes have been proposed. In 2012, He et al. proposed a robust biometric-based user authentication scheme but Yoon and Kim demonstrated that He et al.’s scheme has various security problems. And they proposed an advanced biometric-based user authentication scheme. In this paper, we analyze Yoon and Kim’s scheme and perform the cryptanalysis. We find out that it has still various security weakness such as no perfect forward secrecy, session key exposure by GW node, a DoS attack, no revocation phase, and biometric recognition error.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT&Future Planning (NRF-2014R1A1A2002775).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2006)

    Google Scholar 

  2. Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networkswith public key technology. In: 2nd ACM Workshop on Security of ad Hoc and Sensor Networks, pp. 59–64 (2004)

    Google Scholar 

  3. Tseng, H.R., Jan, R.H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. Sensors, 986–990 (2007)

    Google Scholar 

  4. Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8(3), 86–1090 (2009)

    Article  Google Scholar 

  5. He, D., Gao, Y., Chan, S., Chen, C., Bu, J.: An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. Sensors 10(4), 361–371 (2010)

    Google Scholar 

  6. Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450–2459 (2010)

    Article  Google Scholar 

  7. Chen, T.H., Shih, W.K.: A Robust Mutual Authentication Protocol for Wireless Sensor Networks. Sensors 32(5) (2010)

    Google Scholar 

  8. Yuan, J., Jiang, C., Jiang, Z.: A biometric-based user authentication for wireless sensor networks. Wuhan University Journal of Natural Sciences 15(3), 272–276 (2010)

    Article  Google Scholar 

  9. Yoon, E.J., Yoo, K.Y.: Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. In: 2011 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI* CC), pp. 392–396 (2011)

    Google Scholar 

  10. Yoon, E.J., Kim, C.: Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks. Sensor Letters 11(9), 1836–1843 (2013)

    Article  Google Scholar 

  11. Nam, J., Choo, K.K.R., Kim, J., Kang, H.K., Kim, J., Paik, J., Won, D.: Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model. The Scientific World Journal (2014)

    Google Scholar 

  12. Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D.: Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Sensors 14(6), 10081–10106 (2014)

    Article  Google Scholar 

  13. Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E90-A, pp. 299–302 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Younsung Choi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, Y., Nam, J., Lee, Y., Jung, S., Won, D. (2015). Cryptanalysis of Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks. In: Park, J., Stojmenovic, I., Jeong, H., Yi, G. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45402-2_190

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45402-2_190

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45401-5

  • Online ISBN: 978-3-662-45402-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics