首页> 外文OA文献 >Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
【2h】

Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks

机译:无线传感器网络中三种认证方案的密码分析和安全增强

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and academic community. To facilitate real-time data access for external users from the sensor nodes directly, password-based authentication has become the prevalent authentication mechanism in the past decades. In this work, we investigate three foremost protocols in the area of password-based user authentication scheme for WSNs. Firstly, we analyze an efficient and anonymous protocol and demonstrate that though this protocol is equipped with a formal proof, it actually has several security loopholes been overlooked, such that it cannot resist against smart card loss attack and violate forward secrecy. Secondly, we scrutinize a lightweight protocol and point out that it cannot achieve the claimed security goal of forward secrecy, as well as suffering from user anonymity violation attack and offline password guessing attack. Thirdly, we find that an anonymous scheme fails to preserve two critical properties of forward secrecy and user friendliness. In addition, by adopting the “perfect forward secrecy (PFS)” principle, we provide several effective countermeasures to remedy the identified weaknesses. To test the necessity and effectiveness of our suggestions, we conduct a comparison of 10 representative schemes in terms of the underlying cryptographic primitives used for realizing forward secrecy.
机译:如今无线传感器网络(WSNS)从工业世界和学术界造成了极大的关注。为了便于从传感器节点直接从传感器节点进行外部用户的实时数据访问,基于密码的身份验证已成为过去几十年中的普遍认证机制。在这项工作中,我们在WSN的基于密码的用户身份验证方案区域中调查了三个最重要的协议。首先,我们分析了一个有效和匿名的协议,并证明了虽然该协议配备了正式证据,但它实际上已经被忽视了几个安全漏洞,使得它无法抵抗智能卡损失攻击并违反前向保密。其次,我们仔细审查了轻量级协议,并指出它无法实现前向保密的要求保护的安全目标,以及遭受用户匿名违规攻击和离线密码猜测攻击。第三,我们发现一个匿名方案未能保留前向保密和用户友好性的两个关键属性。此外,通过采用“完善的前锋保密(PFS)”原则,我们提供了几种有效的对策来弥补所识别的弱点。为了测试我们建议的必要性和有效性,我们在用于实现前锋保密的底层加密原语方面进行10个代表计划的比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号