Abstract
The Internet of Things is the interconnection of devices that exchange collected data with each other through the internet using electronics, software, and sensors. Wireless sensor network is used extensively in implementation of the Internet of Things system. With the increasing use of them, many researchers have focused on the security in wireless sensor network environment. In 2016, Wu et al. proposed a user authentication protocol for wireless sensor network, claiming it was secure from various types of attacks. However, we found out that their scheme has some vulnerabilities to the user impersonation attack, and the denial of service attack. In order to overcome these problems, we review Wu et al.’s protocol and propose an improved protocol based on their protocol. Then, we show that our proposed protocol is more secure than other authentication protocols for wireless sensor network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amin, R., Biswas, G.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36, 58–80 (2016)
Chen, T.H., Shih, W.K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010)
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D.: Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6), 10081–10106 (2014)
Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086–1090 (2009)
He, D., Gao, Y., Chan, S., Chen, C., Bu, J.: An enhanced two-factor user authentication scheme in wireless sensor networks. Ad hoc Sens. Wirel. Netw. 10(4), 361–371 (2010)
Hsieh, W.B., Leu, J.S.: A robust user authentication scheme sing dynamic identity in wireless sensor networks. Wirel. Pers. Commun. 77(2), 979–989 (2014)
Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450–2459 (2010)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_31
Shi, W., Gong, P.: A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. 9(4), 730831 (2013)
Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 20, 96–112 (2014)
Vaidya, B., Makrakis, D., Mouftah, H.T.: Improved two-factor user authentication in wireless sensor networks. In: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 600–606. IEEE (2010)
Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64. ACM (2004)
Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006, vol. 1, pp. 244–251. IEEE (2006)
Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient Intell. Humaniz. Comput. 8(1), 101–116 (2017)
Wu, F., Xu, L., Kumari, S., Li, X., Shen, J., Choo, K.K.R., Wazid, M., Das, A.K.: An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89, 72–85 (2017)
Yeh, H.L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (NRF-2010-0020210).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Song, T., Kang, D., Ryu, J., Kim, H., Won, D. (2018). Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2018. ICCSA 2018. Lecture Notes in Computer Science(), vol 10961. Springer, Cham. https://doi.org/10.1007/978-3-319-95165-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-95165-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-95164-5
Online ISBN: 978-3-319-95165-2
eBook Packages: Computer ScienceComputer Science (R0)