Next Article in Journal
Porous TiO2-Based Gas Sensors for Cyber Chemical Systems to Provide Security and Medical Diagnosis
Next Article in Special Issue
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks
Previous Article in Journal
3D-Printed Detector Band for Magnetic Off-Plane Flux Measurements in Laminated Machine Cores
Previous Article in Special Issue
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
Open AccessArticle

An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

New Research Activities Darparment, Beijing University of Posts and Telecommunications, Haidian District, Beijing 100876, China
Author to whom correspondence should be addressed.
Sensors 2017, 17(12), 2946;
Received: 11 November 2017 / Revised: 1 December 2017 / Accepted: 4 December 2017 / Published: 19 December 2017
(This article belongs to the Special Issue Security, Trust and Privacy for Sensor Networks)
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. View Full-Text
Keywords: user authentication; smart card; offline dictionary attack user authentication; smart card; offline dictionary attack
Show Figures

Graphical abstract

MDPI and ACS Style

Wang, C.; Xu, G.; Sun, J. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks. Sensors 2017, 17, 2946.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map

Back to TopTop