scholarly journals Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks

2016 ◽  
Vol 12 (7) ◽  
pp. 155014771665860 ◽  
Author(s):  
YoHan Park ◽  
SungYup Lee ◽  
ChangKyun Kim ◽  
YoungHo Park

Recently, Maitra et al. proposed an efficient and robust user authentication scheme for hierarchical wireless sensor networks. They claimed that their scheme does not need tamper-proof smart card and resisted different possible attacks include smart card stolen attack, impersonation attack, privileged insider attack, replay attack, off-line password guessing attack, theft attack, session key recovery attack, denial of service attack, and cluster head capture attack. However, we find some weaknesses of his scheme in this article. We show that their scheme is vulnerable to off-line password guessing with smart card stolen attack.


Recently, Maitra et al. proposed an efficient and robust user authentication scheme for hierarchical wireless sensor networks. They claimed that their scheme does not need tamper-proof smart card and resisted different possible attacks include smart card stolen attack, impersonation attack, privileged insider attack, replay attack, off-line password guessing attack, theft attack, session key recovery attack, denial of service attack, and cluster head capture attack. However, we find some weaknesses of his scheme in this article. We show that their scheme is vulnerable to off-line password guessing with smart card stolen attack.


Author(s):  
SHANTALA DEVI PATIL ◽  
VIJAYAKUMAR B P

In Wireless Sensor Networks, Broadcast communication is the most fundamental and prevailing communication pattern. Securing the broadcast messages from the adversary is critical issue. To defend the WSNs against the adversary attacks of impersonation of a broadcast source or receiver, modification/fabrication of the broadcast message, attacker injecting malicious traffic to deplete the energy from the sensors, broadcast authentication of source and receivers becomes extremely inevitable. In this paper, we propose a novel ECC based public key distribution protocol and broadcast authentication scheme. The proposed method provides high security and has low overhead.


Sign in / Sign up

Export Citation Format

Share Document