On the Security and Improvement of a Two-Factor User Authentication Scheme in Wireless Sensor Networks

Da-Zhi Sun,Jian-Xin Li,Zhi-Yong Feng,Zhen-Fu Cao,Guang-Quan Xu
DOI: https://doi.org/10.1007/s00779-012-0540-3
2012-01-01
Personal and Ubiquitous Computing
Abstract:User authentication is a basic security requirement during the deployment of the wireless sensor network (WSN), because it may operate in a rather hostile environment, such as a military battlefield. In 2010, Khan and Alghathbar (KA) found out that Das's two-factor user authentication scheme for WSNs is vulnerable to the gateway node (GW-node) bypassing attack and the privileged-insider attack. They further presented an improved scheme to overcome the security flaws of Das's scheme. However, in this paper, we show that KA's scheme still suffers from the GW-node impersonation attack, the GW-node bypassing attack, and the privileged-insider attack. Hence, to fix the security flaws in KA's scheme, we propose a new user authentication scheme for WSNs. The security of the user authentication session in the proposed scheme is reduced by the model of Bellare and Rogaway. The security of partial compromise of secrets in the proposed scheme is reduced and analyzed by our adversarial model. Based on the performance evaluation, the overall cost of the proposed scheme is less than that of KA's scheme. Hence, we believe that the proposed scheme is more suitable for real security applications than KA's scheme.
What problem does this paper attempt to address?