Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
Top Cited Papers
Open Access
- 14 December 2016
- Vol. 16 (12), 2123
- https://doi.org/10.3390/s16122123
Abstract
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.Keywords
This publication has 26 references indexed in Scilit:
- Internet of Things (IoT): A vision, architectural elements, and future directionsFuture Generation Computer Systems, 2013
- A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves CryptographySensors, 2011
- A Robust Mutual Authentication Protocol for Wireless Sensor NetworksETRI Journal, 2010
- Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’Sensors, 2010
- Security and Privacy Issues in Wireless Sensor Networks for Healthcare ApplicationsJournal of Medical Systems, 2010
- An efficient biometrics-based remote user authentication scheme using smart cardsJournal of Network and Computer Applications, 2010
- Wireless sensor network surveyComputer Networks, 2008
- Security in wireless sensor networksCommunications of the ACM, 2004
- A survey on sensor networksIEEE Communications Magazine, 2002
- A logic of authenticationProceedings of the Royal Society of London. Series A - Mathematical and Physical Sciences, 1989