A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
Recently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have se...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2013-05-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2013/543950 |
_version_ | 1797705898845536256 |
---|---|
author | Sang Guun Yoo Hyukjun Lee Juho Kim |
author_facet | Sang Guun Yoo Hyukjun Lee Juho Kim |
author_sort | Sang Guun Yoo |
collection | DOAJ |
description | Recently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. On the other hand, they also present a usability constraint, in a sense that they do not consider the use case when sensor nodes cannot communicate with gateway node. In this case, data collected by isolated sensor nodes could not be accessed until they recover such communication, which is in many times not recoverable rapidly or forever (e.g., military applications, natural disaster monitoring). Due to all these reasons, this paper proposes a robust user authentication scheme which fixes the security weaknesses of previous solutions and provides wider usability considering the use case when the sensor nodes cannot communicate with the gateway node. Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation. |
first_indexed | 2024-03-12T05:44:09Z |
format | Article |
id | doaj.art-19596485e6bc4c1eaffa952f4daccbf8 |
institution | Directory Open Access Journal |
issn | 1550-1477 |
language | English |
last_indexed | 2024-03-12T05:44:09Z |
publishDate | 2013-05-01 |
publisher | Hindawi - SAGE Publishing |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj.art-19596485e6bc4c1eaffa952f4daccbf82023-09-03T05:43:20ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-05-01910.1155/2013/543950A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor NetworksSang Guun YooHyukjun LeeJuho KimRecently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. On the other hand, they also present a usability constraint, in a sense that they do not consider the use case when sensor nodes cannot communicate with gateway node. In this case, data collected by isolated sensor nodes could not be accessed until they recover such communication, which is in many times not recoverable rapidly or forever (e.g., military applications, natural disaster monitoring). Due to all these reasons, this paper proposes a robust user authentication scheme which fixes the security weaknesses of previous solutions and provides wider usability considering the use case when the sensor nodes cannot communicate with the gateway node. Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.https://doi.org/10.1155/2013/543950 |
spellingShingle | Sang Guun Yoo Hyukjun Lee Juho Kim A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks International Journal of Distributed Sensor Networks |
title | A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks |
title_full | A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks |
title_fullStr | A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks |
title_full_unstemmed | A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks |
title_short | A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks |
title_sort | performance and usability aware secure two factor user authentication scheme for wireless sensor networks |
url | https://doi.org/10.1155/2013/543950 |
work_keys_str_mv | AT sangguunyoo aperformanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks AT hyukjunlee aperformanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks AT juhokim aperformanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks AT sangguunyoo performanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks AT hyukjunlee performanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks AT juhokim performanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks |