Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security

作者: Jongho Moon , Youngsook Lee , Hyungkyu Yang , Taeui Song , Dongho Won

DOI: 10.1109/ICOIN.2018.8343154

关键词:

摘要: User authentication in wireless sensor networks is more complex than normal due to network characteristics such as unmanned operation, limited resources, and unreliable communication. For this reason, various protocols have been presented provide secure efficient In 2017, Wu et al. a provable privacy-preserving user protocol for networks. Unfortunately, we found that al.'s was still vulnerable against impersonation attack, had problem the password change phase. We show how an attacker can impersonate other why phase ineffective.

参考文章(15)
Victor S. Miller, Use of Elliptic Curves in Cryptography international cryptology conference. pp. 417- 426 ,(1985) , 10.1007/3-540-39799-X_31
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
Neal Koblitz, Elliptic curve cryptosystems Mathematics of Computation. ,vol. 48, pp. 203- 209 ,(1987) , 10.1090/S0025-5718-1987-0866109-5
Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah, Improved two-factor user authentication in wireless sensor networks wireless and mobile computing, networking and communications. pp. 600- 606 ,(2010) , 10.1109/WIMOB.2010.5645004
Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Junghyun Nam, Dongho Won, Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors. ,vol. 14, pp. 10081- 10106 ,(2014) , 10.3390/S140610081
Paul Kocher, Joshua Jaffe, Benjamin Jun, Pankaj Rohatgi, Introduction to differential power analysis Journal of Cryptographic Engineering. ,vol. 1, pp. 5- 27 ,(2011) , 10.1007/S13389-011-0006-Y
Jing Xu, Wen-Tao Zhu, Deng-Guo Feng, An improved smart card based password authentication scheme with provable security Computer Standards & Interfaces. ,vol. 31, pp. 723- 728 ,(2009) , 10.1016/J.CSI.2008.09.006
Wen-Bin Hsieh, Jenq-Shiou Leu, A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks Wireless Personal Communications. ,vol. 77, pp. 979- 989 ,(2014) , 10.1007/S11277-013-1547-4