首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:Cryptanalysis on Privacy-Aware Two-Factor Authentication Protocol for Wireless Sensor Networks
  • 其他标题:Cryptanalysis on Privacy-Aware Two-Factor Authentication Protocol for Wireless Sensor Networks
  • 本地全文:下载
  • 作者:Younsung Choi
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2018
  • 卷号:8
  • 期号:1
  • 页码:605-610
  • DOI:10.11591/ijece.v8i1.pp605-610
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSNs. However, this paper performs a vulnerability analysis on Jiang et al.’s authentication protocol and shows that it has security problems, such as a lack of mutual authentication, a risk of SID modification and DoS attacks, a lack of sensor anonymity, and weak ID anonymity.
  • 其他摘要:Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang et al . proposed a privacy-aware two-factor authentication protocol based on ECC for WSNs. However, this paper performs a vulnerability analysis on Jiang et al .’s authentication protocol and shows that it has security problems, such as a lack of mutual authentication, a risk of SID modification and DoS attacks, a lack of sensor anonymity, and weak ID anonymity.
  • 关键词:Wireless sensor networks; Security vulnerability;Cryptanalysis; Vulnerability analysis; Wireless sensor networks
国家哲学社会科学文献中心版权所有