Skip to main content

Comments on a Secure and Efficient Three-Factor Authentication Protocol Using Honey List for WSN

  • Conference paper
  • First Online:
Advances in Intelligent Systems and Computing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 268))

  • 534 Accesses

Abstract

In 2020, Lee et al. Proposed a secure and efficient three-factor authentication protocol for wireless sensor networks based on a honey list. They claim that their protocol can withstand various attacks. However, this paper still proves that Lee et al. protocol is insecure against known session-specific temporary information exposure attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bojjagani, S., Sastry, V., Chen, C.M., Kumari, S., Khan, M.K.: Systematic survey of mobile payments, protocols, and security infrastructure. J. Ambient Intell. Human. Comput. 1–46 (2021)

    Google Scholar 

  2. Chen, C.M., Deng, X., Gan, W., Chen, J., Islam, S.H.: A secure blockchain-based group key agreement protocol for iot. J. Supercomput. 1–23 (2021)

    Google Scholar 

  3. Chen, C.M., Fang, W., Wang, K.H., Wu, T.Y.: Comments on “an improved secure and efficient password and chaos-based two-party key agreement protocol’’. Nonlinear Dyn. 87(3), 2073–2075 (2017)

    Article  Google Scholar 

  4. Chen, C.M., Li, C.T., Liu, S., Wu, T.Y., Pan, J.S.: A provable secure private data delegation scheme for mountaineering events in emergency system. Ieee Access 5, 3410–3422 (2017)

    Article  Google Scholar 

  5. Estrin, D., Girod, L., Pottie, G., Srivastava, M.: Instrumenting the world with wireless sensor networks. In: 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No. 01CH37221). vol. 4, pp. 2033–2036. IEEE (2001)

    Google Scholar 

  6. Hussain, S., Ullah, I., Khattak, H., Khan, M.A., Chen, C.M., Kumari, S.: A lightweight and provable secure identity-based generalized proxy signcryption (ibgps) scheme for industrial internet of things (iiot). J. Inf. Secur. Appl. 58, 102625 (2021)

    Google Scholar 

  7. Khan, M.A., Salah, K.: Iot security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  8. Lee, I., Lee, K.: The internet of things (iot): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)

    Article  Google Scholar 

  9. Lee, J., Yu, S., Kim, M., Park, Y., Das, A.K.: On the design of secure and efficient three-factor authentication protocol using honey list for wireless sensor networks. IEEE Access 8, 107046–107062 (2020)

    Article  Google Scholar 

  10. Li, C.T., Lee, C.C., Weng, C.Y., Chen, C.M.: Towards secure authenticating of cache in the reader for rfid-based iot systems. Peer Peer Netw. Appl. 11(1), 198–208 (2018)

    Article  Google Scholar 

  11. Shamshad, S., Mahmood, K., Kumari, S., Chen, C.M., et al.: A secure blockchain-based e-health records storage and sharing scheme. J. Inf. Secur. Appl. 55, 102590 (2020)

    Google Scholar 

  12. Sun, H.M., Wang, K.H., Chen, C.M.: On the security of an efficient time-bound hierarchical key management scheme. IEEE Trans. Depend. Secur. Comput. 6(2), 159–160 (2009)

    Article  Google Scholar 

  13. Wang, E.K., Chen, C.M., Hassan, M.M., Almogren, A.: A deep learning based medical image segmentation technique in internet-of-medical-things domain. Futur. Gener. Comput. Syst. 108, 135–144 (2020)

    Article  Google Scholar 

  14. Wang, K., Chen, C.M., Liang, Z., Hassan, M.M., Sarné, G.M., Fotia, L., Fortino, G.: A trusted consensus fusion scheme for decentralized collaborated learning in massive iot domain. Inf. Fusion 72, 100–109 (2021)

    Article  Google Scholar 

  15. Wang, P., Chen, C.M., Kumari, S., Shojafar, M., Tafazolli, R., Liu, Y.N.: Hdma: hybrid d2d message authentication scheme for 5g-enabled vanets. IEEE Trans. Intell. Transp. Syst. (2020)

    Google Scholar 

  16. Wu, T.Y., Chen, C.M., Wang, K.H., Wu, J.M.T.: Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7, 49232–49239 (2019)

    Article  Google Scholar 

  17. Yavari, M., Safkhani, M., Kumari, S., Kumar, S., Chen, C.M.: An improved blockchain-based authentication protocol for iot network management. Secur. Commun. Netw. (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chien-Ming Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lee, X., Yang, L., Zhang, Z., Wu, TY., Chen, CM. (2022). Comments on a Secure and Efficient Three-Factor Authentication Protocol Using Honey List for WSN. In: Zhang, JF., Chen, CM., Chu, SC., Kountchev, R. (eds) Advances in Intelligent Systems and Computing. Smart Innovation, Systems and Technologies, vol 268. Springer, Singapore. https://doi.org/10.1007/978-981-16-8048-9_34

Download citation

Publish with us

Policies and ethics