Abstract
Recently, wireless sensor networks can provide a practicable real-time monitoring system because wireless sensors can be easily deployed in various environments. To provide secure and efficient communication, various user authentication schemes have been proposed. In 2012, He et al. proposed a robust biometric-based user authentication scheme but Yoon and Kim demonstrated that He et al.’s scheme has various security problems. And they proposed an advanced biometric-based user authentication scheme. In this paper, we analyze Yoon and Kim’s scheme and perform the cryptanalysis. We find out that it has still various security weakness such as no perfect forward secrecy, session key exposure by GW node, a DoS attack, no revocation phase, and biometric recognition error.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT&Future Planning (NRF-2014R1A1A2002775).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2006)
Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networkswith public key technology. In: 2nd ACM Workshop on Security of ad Hoc and Sensor Networks, pp. 59–64 (2004)
Tseng, H.R., Jan, R.H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. Sensors, 986–990 (2007)
Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8(3), 86–1090 (2009)
He, D., Gao, Y., Chan, S., Chen, C., Bu, J.: An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. Sensors 10(4), 361–371 (2010)
Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450–2459 (2010)
Chen, T.H., Shih, W.K.: A Robust Mutual Authentication Protocol for Wireless Sensor Networks. Sensors 32(5) (2010)
Yuan, J., Jiang, C., Jiang, Z.: A biometric-based user authentication for wireless sensor networks. Wuhan University Journal of Natural Sciences 15(3), 272–276 (2010)
Yoon, E.J., Yoo, K.Y.: Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. In: 2011 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI* CC), pp. 392–396 (2011)
Yoon, E.J., Kim, C.: Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks. Sensor Letters 11(9), 1836–1843 (2013)
Nam, J., Choo, K.K.R., Kim, J., Kang, H.K., Kim, J., Paik, J., Won, D.: Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model. The Scientific World Journal (2014)
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D.: Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Sensors 14(6), 10081–10106 (2014)
Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E90-A, pp. 299–302 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, Y., Nam, J., Lee, Y., Jung, S., Won, D. (2015). Cryptanalysis of Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks. In: Park, J., Stojmenovic, I., Jeong, H., Yi, G. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45402-2_190
Download citation
DOI: https://doi.org/10.1007/978-3-662-45402-2_190
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45401-5
Online ISBN: 978-3-662-45402-2
eBook Packages: EngineeringEngineering (R0)