A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Top Cited Papers
- 26 August 2015
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Wireless Communications
- Vol. 15 (1), 357-366
- https://doi.org/10.1109/twc.2015.2473165
Abstract
In 2014, Turkanovic et al. proposed a smart card-based authentication scheme for heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it employs only hash function and XOR operation. However, we found that Turkanovic et al.'s scheme is vulnerable to impersonation attack with node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy. We propose an efficient scheme to overcome all those weaknesses. Moreover, we also propose an advanced scheme, which provides perfect forward secrecy without much modification from the first proposed scheme.Keywords
This publication has 16 references indexed in Scilit:
- Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves CryptographySensors, 2014
- Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility NetworksInternational Journal of Distributed Sensor Networks, 2014
- An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor NetworksSensors, 2013
- An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor NetworksElectronics and Electrical Engineering, 2013
- A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves CryptographyInternational Journal of Distributed Sensor Networks, 2013
- A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networksJournal of Network and Computer Applications, 2013
- A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves CryptographySensors, 2011
- Two-factor user authentication in wireless sensor networksIEEE Transactions on Wireless Communications, 2009
- An Improved Dynamic User Authentication Scheme for Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993