A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks

Recently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have se...

Full description

Bibliographic Details
Main Authors: Sang Guun Yoo, Hyukjun Lee, Juho Kim
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2013-05-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/543950
_version_ 1797705898845536256
author Sang Guun Yoo
Hyukjun Lee
Juho Kim
author_facet Sang Guun Yoo
Hyukjun Lee
Juho Kim
author_sort Sang Guun Yoo
collection DOAJ
description Recently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. On the other hand, they also present a usability constraint, in a sense that they do not consider the use case when sensor nodes cannot communicate with gateway node. In this case, data collected by isolated sensor nodes could not be accessed until they recover such communication, which is in many times not recoverable rapidly or forever (e.g., military applications, natural disaster monitoring). Due to all these reasons, this paper proposes a robust user authentication scheme which fixes the security weaknesses of previous solutions and provides wider usability considering the use case when the sensor nodes cannot communicate with the gateway node. Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.
first_indexed 2024-03-12T05:44:09Z
format Article
id doaj.art-19596485e6bc4c1eaffa952f4daccbf8
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T05:44:09Z
publishDate 2013-05-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-19596485e6bc4c1eaffa952f4daccbf82023-09-03T05:43:20ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-05-01910.1155/2013/543950A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor NetworksSang Guun YooHyukjun LeeJuho KimRecently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. On the other hand, they also present a usability constraint, in a sense that they do not consider the use case when sensor nodes cannot communicate with gateway node. In this case, data collected by isolated sensor nodes could not be accessed until they recover such communication, which is in many times not recoverable rapidly or forever (e.g., military applications, natural disaster monitoring). Due to all these reasons, this paper proposes a robust user authentication scheme which fixes the security weaknesses of previous solutions and provides wider usability considering the use case when the sensor nodes cannot communicate with the gateway node. Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.https://doi.org/10.1155/2013/543950
spellingShingle Sang Guun Yoo
Hyukjun Lee
Juho Kim
A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
International Journal of Distributed Sensor Networks
title A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
title_full A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
title_fullStr A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
title_full_unstemmed A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
title_short A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
title_sort performance and usability aware secure two factor user authentication scheme for wireless sensor networks
url https://doi.org/10.1155/2013/543950
work_keys_str_mv AT sangguunyoo aperformanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks
AT hyukjunlee aperformanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks
AT juhokim aperformanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks
AT sangguunyoo performanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks
AT hyukjunlee performanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks
AT juhokim performanceandusabilityawaresecuretwofactoruserauthenticationschemeforwirelesssensornetworks