Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”
- 225 Downloads
Xue et al. recently proposed an innovative mutual authentication and key agreement scheme for wireless sensor networks based on temporal credential using smart cards. However, in this paper we demonstrate that their scheme is vulnerable to password guessing attacks, node capture attacks and denial-of-service attacks. Furthermore we show that their scheme has some inconsistencies which make it less secure and more computationally costly than originally presented.
KeywordsWireless sensor network Mutual authentication Temporal credential Key agreement Smart card
The authors are grateful to all referees for important and helpful remarks, advice and suggestions concerning the content of the paper.
- 6.Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks (Vol. 32, Vol. 5). Taejon, COREE, REPUBLIQUE DE: Electronics and Telecommunications Research Institute.Google Scholar
- 9.Knudsen, L., & Robshaw, M. B. (2011). Brute force attacks. In: The block cipher companion. Information Security and Cryptography (pp. 95–108). Springer, Berlin, Heidelberg.Google Scholar
- 10.Adams, C. (2011). Dictionary attack. In H. A. van Tilborg & S. Jajodia (Eds.), Encyclopedia of cryptography and security (p. 332). USA: Springer.Google Scholar
- 11.Graham, R. (2009). How hackers will crack your password. http://www.darkreading.com/hacked-off/how-hackers-will-crack-your-password/227700892. Accessed 11 Sept 2013
- 12.Bonneau, J. (2012). The science of guessing: analyzing an anonymized corpus of 70 million passwords. Paper presented at the 2012 IEEE symposium on security and privacy. San Francisco, CA, USA.Google Scholar
- 14.Kocher, P. C., Jaffe, J., & Jun, B. (1999). Differential power analysis. Paper presented at the proceedings of the 19th annual international cryptology conference on advances in cryptology.Google Scholar
- 15.Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis and defenses. Paper presented at the proceedings of the 3rd international symposium on information processing in sensor networks, Berkeley, California, USA.Google Scholar