Next Article in Journal
Rhodotorula Mucilaginosa, a Quorum Quenching Yeast Exhibiting Lactonase Activity Isolated from a Tropical Shoreline
Previous Article in Journal
CPAC: Energy-Efficient Data Collection through Adaptive Selection of Compression Algorithms for Sensor Networks
Article Menu

Export Article

Open AccessArticle
Sensors 2014, 14(4), 6443-6462; doi:10.3390/s140406443

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

1
College of Information and Communication Engineering, Sungkyunkwan University, 2066 Seobu-Ro, Jangan-Gu, Suwon-Si, Gyeonggi-Do 440-746, Korea
2
Department of Cyber Security and Police, Gwangju University, 277 Hyodeok-Ro, Nam-Gu, Gwangju-Si 503-703, Korea
3
Department of Cyber Investigation Police, Howon University, 64 Howon University 3Gil, Impi-Myeon, Gunsan-Si, Jeonrabuk-Do 573-718, Korea
4
College of Information and Communication Engineering, Sungkyunkwan University, 2066 Seobu-Ro, Jangan-Gu, Suwon-Si, Gyeonggi-Do 440-746, Korea
*
Author to whom correspondence should be addressed.
Received: 22 January 2014 / Revised: 30 March 2014 / Accepted: 31 March 2014 / Published: 9 April 2014
(This article belongs to the Section Sensor Networks)
View Full-Text   |   Download PDF [665 KB, uploaded 21 June 2014]   |  

Abstract

User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker’s own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. View Full-Text
Keywords: wireless sensor networks (WSNs); mutual authentication; key agreement; two-factor authentication; passwords; smart cards wireless sensor networks (WSNs); mutual authentication; key agreement; two-factor authentication; passwords; smart cards
This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Kim, J.; Lee, D.; Jeon, W.; Lee, Y.; Won, D. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks. Sensors 2014, 14, 6443-6462.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top