Abstract
In 2020, Yu et al. proposed a secure, lightweight three-factors user authentication protocol named SLUA-WSA for wireless sensor networks. SLUA-WSA can effectively prevent security threats, ensure anonymity, untraceability, and mutual authentication. However, in this paper, we demonstrate that Yu et al.’s protocol is still vulnerable to known session-specific temporary information attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, C.M., Fang, W., Wang, K.H., Wu, T.Y.: Comments on “an improved secure and efficient password and chaos-based two-party key agreement protocol’’. Nonlinear Dyn. 87(3), 2073–2075 (2017)
Chen, C.M., Li, C.T., Liu, S., Wu, T.Y., Pan, J.S.: A provable secure private data delegation scheme for mountaineering events in emergency system. Ieee Access 5, 3410–3422 (2017)
Chen, C.M., Xiang, B., Wu, T.Y., Wang, K.H.: An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks. Appl. Sci. 8(7), 1074 (2018)
Chen, C.L., Deng, Y.Y., Weng, W., Chen, C.H., Chiu, Y.J., Wu, C.M.: A traceable and privacy-preserving authentication for uav communication control system. Electronics 9(1), 62 (2020)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004, vol. 1. IEEE (2004)
Estrin, D., Girod, L., Pottie, G., Srivastava, M.: Instrumenting the world with wireless sensor networks. In: 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No. 01CH37221). vol. 4, pp. 2033–2036. IEEE (2001)
Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware key management scheme for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, pp. 29–42 (2004)
Hussain, S., Ullah, I., Khattak, H., Khan, M.A., Chen, C.M., Kumari, S.: A lightweight and provable secure identity-based generalized proxy signcryption (ibgps) scheme for industrial internet of things (iiot). J. Inf. Secur. Appl. 58, 102625 (2021)
Khan, M.A., Salah, K.: Iot security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)
Kumari, S., Chaudhary, P., Chen, C.M., Khan, M.K.: Questioning key compromise attack on ostad-sharif et al.’s authentication and session key generation scheme for healthcare applications. IEEE Access 7, 39717–39720 (2019)
Kwon, D., Yu, S., Lee, J., Son, S., Park, Y.: Wsn-slap: secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors 21(3), 936 (2021)
Lee, I., Lee, K.: The internet of things (iot): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)
Li, C.T., Lee, C.C., Weng, C.Y., Chen, C.M.: Towards secure authenticating of cache in the reader for rfid-based iot systems. Peer Peer Netw. Appl. 11(1), 198–208 (2018)
Lu, Y., Xu, G., Li, L., Yang, Y.: Anonymous three-factor authenticated key agreement for wireless sensor networks. Wireless Netw. 25(4), 1461–1475 (2019)
Mo, J., Chen, H.: A lightweight secure user authentication and key agreement protocol for wireless sensor networks. Secur. Commun. Netw. 2019 (2019)
Moghadam, M.F., Nikooghadam, M., Al Jabban, M.A.B., Alishahi, M., Mortazavi, L., Mohajerzadeh, A.: An efficient authentication and key agreement scheme based on each for wireless sensor network. IEEE Access 8, 73182–73192 (2020)
Renuka, K., Kumar, S., Kumari, S., Chen, C.M.: Cryptanalysis and improvement of a privacy-preserving three-factor authentication protocol for wireless sensor networks. Sensors 19(21), 4625 (2019)
Sarma, S.E., Weis, S.A., Engels, D.W.: Rfid systems and security and privacy implications. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 454–469. Springer (2002)
Shafiq, A., Ayub, M.F., Mahmood, K., Sadiq, M., Kumari, S., Chen, C.M.: An identity-based anonymous three-party authenticated protocol for iot infrastructure. J. Sens. 2020 (2020)
Sun, H.M., Wang, K.H., Chen, C.M.: On the security of an efficient time-bound hierarchical key management scheme. IEEE Trans. Depend. Sec. Comput. 6(2), 159–160 (2009)
Wang, C., Xu, G., Sun, J.: An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12), 2946 (2017)
Wang, D., Wang, P., Wang, C.: Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in wsns. ACM Trans. Cyber-Phys. Syst. 4(3), 1–26 (2020)
Wang, E.K., Liang, Z., Chen, C.M., Kumari, S., Khan, M.K.: Porx: A reputation incentive scheme for blockchain consensus of iiot. Futur. Gener. Comput. Syst. 102, 140–151 (2020)
Wu, T.Y., Chen, C.M., Wang, K.H., Wu, J.M.T.: Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7, 49232–49239 (2019)
Yahuza, M., Idris, M.Y.I., Wahab, A.W.A., Nandy, T., Ahmedy, I.B., Ramli, R.: An edge assisted secure lightweight authentication technique for safe communication on the internet of drones network. IEEE Access 9, 31420–31440 (2021)
Yu, S., Park, Y.: Slua-wsn: secure and lightweight three-factor-based user authentication protocol for wireless sensor networks. Sensors 20(15), 4143 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, S., Lee, Z., Chen, L., Wu, TY., Chen, CM. (2022). On the Security of a Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks. In: Zhang, JF., Chen, CM., Chu, SC., Kountchev, R. (eds) Advances in Intelligent Systems and Computing. Smart Innovation, Systems and Technologies, vol 268. Springer, Singapore. https://doi.org/10.1007/978-981-16-8048-9_30
Download citation
DOI: https://doi.org/10.1007/978-981-16-8048-9_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8047-2
Online ISBN: 978-981-16-8048-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)