Three-Factor User Authentication Method Using Biometrics Challenge Response

Author(s):  
Haruhiko Fujii ◽  
Yukio Tsuruoka
Author(s):  
Jihyeon Ryu ◽  
Hakjun Lee ◽  
Hyoungshick Kim ◽  
Dongho Won

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.'s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.'s scheme in detail. We also propose a new scheme by fixing such vulnerabilities and improving the performance of the protocol.


2019 ◽  
Vol 58 (2) ◽  
pp. 545-565 ◽  
Author(s):  
Liang Kou ◽  
Yiqi Shi ◽  
Liguo Zhang ◽  
Duo Liu ◽  
Qing Yang

Sign in / Sign up

Export Citation Format

Share Document