Enhancement of Two-Factor User Authentication in Wireless Sensor Networks

Wireless sensor networks are widely used for applications such as environmental monitoring, airport safety, health care, etc. For user authentication, in 2009, Das proposed a two-factor user authentication scheme in wireless sensor networks. They claimed that this scheme provided efficiency, strong security, and user anonymity property. However, we find that Das’s scheme is still vulnerable to masquerade attack and cannot achieve user anonymity. This paper will propose an improvement to remedy the weakness of Das’s scheme.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  Edgar H. Callaway,et al.  Wireless Sensor Networks: Architectures and Protocols , 2003 .

[4]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[5]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[6]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[7]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[8]  Ashutosh Saxena,et al.  A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.

[9]  Kemal Bicakci,et al.  One-Time sensors: a novel concept to mitigate node-capture attacks , 2005 .

[10]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[11]  Felix C. Freiling,et al.  User Authentication in Sensor Networks , 2004, GI Jahrestagung.