Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction
Wireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication networks, resource limitatio...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2016-01-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2016/8572410 |
_version_ | 1797723437344489472 |
---|---|
author | Younsung Choi Youngsook Lee Dongho Won |
author_facet | Younsung Choi Youngsook Lee Dongho Won |
author_sort | Younsung Choi |
collection | DOAJ |
description | Wireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication networks, resource limitation, and unattended operation. As a result, various authentication schemes have been proposed to provide secure and efficient communication. He et al. suggested a robust biometrics-based user authentication scheme, but Yoon and Kim indicated that their scheme had several security vulnerabilities. The latter then proposed an advanced biometrics-based user authentication scheme; in this paper, we analyze this advanced scheme and perform a cryptanalysis. Our analysis shows that Yoon and Kim's scheme has various security weaknesses such as a biometric recognition error, a user verification problem, lack of anonymity and perfect forward secrecy, session key exposure by the gateway node, vulnerability to denial of service attacks, and a revocation problem. Therefore, we suggest countermeasures that can be implemented to solve these problems and then propose a security-enhanced biometrics-based user authentication scheme using fuzzy extraction that conforms to the proposed countermeasures. Finally, we conduct a security analysis for the proposed biometrics-based user authentication scheme. |
first_indexed | 2024-03-12T10:01:55Z |
format | Article |
id | doaj.art-e6aa79cd7bf14d53b3be0dfeb1108ceb |
institution | Directory Open Access Journal |
issn | 1550-1477 |
language | English |
last_indexed | 2024-03-12T10:01:55Z |
publishDate | 2016-01-01 |
publisher | Hindawi - SAGE Publishing |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj.art-e6aa79cd7bf14d53b3be0dfeb1108ceb2023-09-02T11:38:30ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772016-01-011210.1155/2016/85724108572410Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy ExtractionYounsung Choi0Youngsook Lee1Dongho Won2 Department of Computer Engineering, Sungkyunkwan University, 2066 Seoburo, Suwon, Gyeonggido 440-746, Republic of Korea Department of Cyber Investigation Police, Howon University, 64 Howon University 3Gil, Impi-Myeon, Gunsan-Si, Jeonrabuk-Do 573-718, Republic of Korea Department of Computer Engineering, Sungkyunkwan University, 2066 Seoburo, Suwon, Gyeonggido 440-746, Republic of KoreaWireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication networks, resource limitation, and unattended operation. As a result, various authentication schemes have been proposed to provide secure and efficient communication. He et al. suggested a robust biometrics-based user authentication scheme, but Yoon and Kim indicated that their scheme had several security vulnerabilities. The latter then proposed an advanced biometrics-based user authentication scheme; in this paper, we analyze this advanced scheme and perform a cryptanalysis. Our analysis shows that Yoon and Kim's scheme has various security weaknesses such as a biometric recognition error, a user verification problem, lack of anonymity and perfect forward secrecy, session key exposure by the gateway node, vulnerability to denial of service attacks, and a revocation problem. Therefore, we suggest countermeasures that can be implemented to solve these problems and then propose a security-enhanced biometrics-based user authentication scheme using fuzzy extraction that conforms to the proposed countermeasures. Finally, we conduct a security analysis for the proposed biometrics-based user authentication scheme.https://doi.org/10.1155/2016/8572410 |
spellingShingle | Younsung Choi Youngsook Lee Dongho Won Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction International Journal of Distributed Sensor Networks |
title | Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction |
title_full | Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction |
title_fullStr | Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction |
title_full_unstemmed | Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction |
title_short | Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction |
title_sort | security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction |
url | https://doi.org/10.1155/2016/8572410 |
work_keys_str_mv | AT younsungchoi securityimprovementonbiometricbasedauthenticationschemeforwirelesssensornetworksusingfuzzyextraction AT youngsooklee securityimprovementonbiometricbasedauthenticationschemeforwirelesssensornetworksusingfuzzyextraction AT donghowon securityimprovementonbiometricbasedauthenticationschemeforwirelesssensornetworksusingfuzzyextraction |