Skip to main content

Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks

  • Conference paper
Computational Science and Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 603))

Abstract

Wireless sensor networks are used to monitor various environmental conditions such as temperature, sound, pollution level, humidity, wind and so on. Therefore, fast and secure authentication is important and requires a lightweight protocol that is secure. AmirHosein et al. proposed a 3-factor protocol in wireless sensor networks, but we found that the protocol in the wireless sensor network had some weaknesses. Firstly, it is a weakness in smart card deodorization. And it is also vulnerable to user impersonation. Moreover, it is possible to attack the session key. In this paper, we describe this weakness and prove AmirHosein et al.’s scheme is insecure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Adavoudi-Jolfaei, A., Ashouri-Talouki, M., Aghili, S. F.: Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Networking and Applications, 12(1), 43–59. (2019)

    Google Scholar 

  • Gope, P., Das, A. K., Kumar, N., Cheng, Y.: Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Transactions on Industrial Informatics. (2019)

    Google Scholar 

  • Li, X., Peng, J., Obaidat, M. S., Wu, F., Khan, M. K., Chen, C.: A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems. IEEE Systems Journal. (2019)

    Google Scholar 

  • Rani, R., Kakkar, D., Kakkar, P., Raman, A.: Distance based enhanced threshold sensitive stable election routing protocol for heterogeneous wireless sensor network. In Computational Intelligence in Sensor Networks, Springer, Berlin, Heidelberg. 101–122. (2019)

    Google Scholar 

  • Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on industrial electronics, 63(11), 7124–7132. (2016)

    Google Scholar 

  • Wong, K. H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06) 1(8). (2006)

    Google Scholar 

  • Tseng, H. R., Jan, R. H., Yang, W.:. An improved dynamic user authentication scheme for wireless sensor networks. In IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference. 986–990. (2007)

    Google Scholar 

  • Vaidya, B., S Silva, J., Rodrigues, J. J.: Robust dynamic user authentication scheme for wireless sensor networks. In Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks. 88–91. (2009)

    Google Scholar 

  • Faye, Y., Niang, I., Guyennet, H.: A user authentication-based probabilistic risk approach for Wireless Sensor Networks. In 2012 International Conference on Selected Topics in Mobile and Wireless Networking. 124–129. (2012)

    Google Scholar 

  • Ryu, J., Lee, H., Kim, H., Won, D.: Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks. Sensors, 18(12), 4481. (2018)

    Google Scholar 

  • Moon, J., Lee, D., Lee, Y., Won, D.: Improving biometric-based authentication schemes with smart card revocation/reissue for wireless sensor networks. Sensors, 17(5), 940. (2017)

    Google Scholar 

  • Jung, J., Moon, J., Lee, D., Won, D.: Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks. Sensors, 17(3), 644. (2017)

    Google Scholar 

  • Chung, Y., Choi, S., Lee, Y., Park, N., Won, D.: An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors, 16(10), 1653. (2016)

    Google Scholar 

  • Nam, J., Choo, K. K. R., Han, S., Kim, M., Paik, J., Won, D.: Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. Plos one, 10(4), e0116709. (2015)

    Google Scholar 

  • Das, M. L.: Two-factor user authentication in wireless sensor networks. IEEE transactions on wireless communications, 8(3), 1086–1090. (2009)

    Google Scholar 

  • He, D., Gao, Y., Chan, S., Chen, C., Bu, J.: An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. Ad hoc and sensor wireless networks. 10(4), 361–371. (2010)

    Google Scholar 

  • Khan, M. K., Alghathbar, K.: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors. 10(3), 2450–2459. (2010)

    Google Scholar 

  • Kumar, P., Lee, H. J.: Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In 2011 Wireless Advanced. 241–245. IEEE. (2011)

    Google Scholar 

  • Katz, J., Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A.: Handbook of applied cryptography. CRC press. (1996)

    Google Scholar 

  • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International conference on the theory and applications of cryptographic techniques. 523–540. Springer, Berlin, Heidelberg. (2004)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. 2019R1A2C1010159)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongho Won .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Ryu, J., Lee, Y., Won, D. (2020). Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks. In: Alfred, R., Lim, Y., Haviluddin, H., On, C. (eds) Computational Science and Technology. Lecture Notes in Electrical Engineering, vol 603. Springer, Singapore. https://doi.org/10.1007/978-981-15-0058-9_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0058-9_33

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0057-2

  • Online ISBN: 978-981-15-0058-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics