Cryptanalysis on Privacy-aware two-factor Authentication Protocol for Wireless Sensor Networks

Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key app...

Full description

Saved in:
Bibliographic Details
Main Author: Choi, Younsung (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2017-11-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02086 am a22002893u 4500
001 ijeecs8762_7623
042 |a dc 
100 1 0 |a Choi, Younsung  |e author 
100 1 0 |e contributor 
245 0 0 |a Cryptanalysis on Privacy-aware two-factor Authentication Protocol for Wireless Sensor Networks 
260 |b Institute of Advanced Engineering and Science,   |c 2017-11-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/8762 
520 |a Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSNs. However, this paper performs a vulnerability analysis on Jiang et al.'s authentication protocol and shows that it has security problems, such as a lack of mutual authentication, a risk of SID modification and DoS attacks, a lack of sensor anonymity, and weak ID anonymity. 
540 |a Copyright (c) 2017 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690 |a Cryptanalysis, Vulnerability analysis, Wireless sensor networks 
690
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 8, No 2: November 2017; 296-301 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v8.i2 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/8762/7623 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/8762/7623  |z Get fulltext