Abstract
Wireless sensor networks are used to monitor various environmental conditions such as temperature, sound, pollution level, humidity, wind and so on. Therefore, fast and secure authentication is important and requires a lightweight protocol that is secure. AmirHosein et al. proposed a 3-factor protocol in wireless sensor networks, but we found that the protocol in the wireless sensor network had some weaknesses. Firstly, it is a weakness in smart card deodorization. And it is also vulnerable to user impersonation. Moreover, it is possible to attack the session key. In this paper, we describe this weakness and prove AmirHosein et al.’s scheme is insecure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adavoudi-Jolfaei, A., Ashouri-Talouki, M., Aghili, S. F.: Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Networking and Applications, 12(1), 43–59. (2019)
Gope, P., Das, A. K., Kumar, N., Cheng, Y.: Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Transactions on Industrial Informatics. (2019)
Li, X., Peng, J., Obaidat, M. S., Wu, F., Khan, M. K., Chen, C.: A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems. IEEE Systems Journal. (2019)
Rani, R., Kakkar, D., Kakkar, P., Raman, A.: Distance based enhanced threshold sensitive stable election routing protocol for heterogeneous wireless sensor network. In Computational Intelligence in Sensor Networks, Springer, Berlin, Heidelberg. 101–122. (2019)
Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on industrial electronics, 63(11), 7124–7132. (2016)
Wong, K. H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06) 1(8). (2006)
Tseng, H. R., Jan, R. H., Yang, W.:. An improved dynamic user authentication scheme for wireless sensor networks. In IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference. 986–990. (2007)
Vaidya, B., S Silva, J., Rodrigues, J. J.: Robust dynamic user authentication scheme for wireless sensor networks. In Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks. 88–91. (2009)
Faye, Y., Niang, I., Guyennet, H.: A user authentication-based probabilistic risk approach for Wireless Sensor Networks. In 2012 International Conference on Selected Topics in Mobile and Wireless Networking. 124–129. (2012)
Ryu, J., Lee, H., Kim, H., Won, D.: Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks. Sensors, 18(12), 4481. (2018)
Moon, J., Lee, D., Lee, Y., Won, D.: Improving biometric-based authentication schemes with smart card revocation/reissue for wireless sensor networks. Sensors, 17(5), 940. (2017)
Jung, J., Moon, J., Lee, D., Won, D.: Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks. Sensors, 17(3), 644. (2017)
Chung, Y., Choi, S., Lee, Y., Park, N., Won, D.: An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors, 16(10), 1653. (2016)
Nam, J., Choo, K. K. R., Han, S., Kim, M., Paik, J., Won, D.: Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. Plos one, 10(4), e0116709. (2015)
Das, M. L.: Two-factor user authentication in wireless sensor networks. IEEE transactions on wireless communications, 8(3), 1086–1090. (2009)
He, D., Gao, Y., Chan, S., Chen, C., Bu, J.: An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. Ad hoc and sensor wireless networks. 10(4), 361–371. (2010)
Khan, M. K., Alghathbar, K.: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors. 10(3), 2450–2459. (2010)
Kumar, P., Lee, H. J.: Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In 2011 Wireless Advanced. 241–245. IEEE. (2011)
Katz, J., Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A.: Handbook of applied cryptography. CRC press. (1996)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International conference on the theory and applications of cryptographic techniques. 523–540. Springer, Berlin, Heidelberg. (2004)
Acknowledgements
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. 2019R1A2C1010159)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ryu, J., Lee, Y., Won, D. (2020). Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks. In: Alfred, R., Lim, Y., Haviluddin, H., On, C. (eds) Computational Science and Technology. Lecture Notes in Electrical Engineering, vol 603. Springer, Singapore. https://doi.org/10.1007/978-981-15-0058-9_33
Download citation
DOI: https://doi.org/10.1007/978-981-15-0058-9_33
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0057-2
Online ISBN: 978-981-15-0058-9
eBook Packages: EngineeringEngineering (R0)