Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising...

Full description

Bibliographic Details
Main Authors: Jihyeon Ryu, Hakjun Lee, Hyoungshick Kim, Dongho Won
Format: Article
Language:English
Published: MDPI AG 2018-12-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/18/12/4481
_version_ 1828349217124384768
author Jihyeon Ryu
Hakjun Lee
Hyoungshick Kim
Dongho Won
author_facet Jihyeon Ryu
Hakjun Lee
Hyoungshick Kim
Dongho Won
author_sort Jihyeon Ryu
collection DOAJ
description Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.’s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks.
first_indexed 2024-04-14T01:07:06Z
format Article
id doaj.art-585a483ec3bb4940a341b8e267f6b99a
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-14T01:07:06Z
publishDate 2018-12-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-585a483ec3bb4940a341b8e267f6b99a2022-12-22T02:21:12ZengMDPI AGSensors1424-82202018-12-011812448110.3390/s18124481s18124481Secure and Efficient Three-Factor Protocol for Wireless Sensor NetworksJihyeon Ryu0Hakjun Lee1Hyoungshick Kim2Dongho Won3Department of Platform Software, Sungkyunkwan University, Gyeonggi-do 16419, KoreaDepartment of Electrical and Computer Engineering, Sungkyunkwan University, Gyeonggi-do 16419, KoreaDepartment of Computer Engineering, Sungkyunkwan University, Gyeonggi-do 16419, KoreaDepartment of Computer Engineering, Sungkyunkwan University, Gyeonggi-do 16419, KoreaWireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.’s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks.https://www.mdpi.com/1424-8220/18/12/4481wireless sensor networksuser authenticationbiometricsmart card
spellingShingle Jihyeon Ryu
Hakjun Lee
Hyoungshick Kim
Dongho Won
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
Sensors
wireless sensor networks
user authentication
biometric
smart card
title Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_full Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_fullStr Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_full_unstemmed Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_short Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
title_sort secure and efficient three factor protocol for wireless sensor networks
topic wireless sensor networks
user authentication
biometric
smart card
url https://www.mdpi.com/1424-8220/18/12/4481
work_keys_str_mv AT jihyeonryu secureandefficientthreefactorprotocolforwirelesssensornetworks
AT hakjunlee secureandefficientthreefactorprotocolforwirelesssensornetworks
AT hyoungshickkim secureandefficientthreefactorprotocolforwirelesssensornetworks
AT donghowon secureandefficientthreefactorprotocolforwirelesssensornetworks