A secure three factor-based fully anonymous user authentication protocol for multi-server environment

Author(s):  
Manish Kumar ◽  
Vinod Kumar Mahor ◽  
R. Padmavathi ◽  
Santanu Chatterjee ◽  
Sanshray Kumar Dewangan
Author(s):  
Vinod Kumar Mahor ◽  
R. Padmavathi ◽  
Santanu Chatterjee ◽  
Sanshray Kumar Dewangan ◽  
Manish Kumar

2019 ◽  
Vol 58 (2) ◽  
pp. 545-565 ◽  
Author(s):  
Liang Kou ◽  
Yiqi Shi ◽  
Liguo Zhang ◽  
Duo Liu ◽  
Qing Yang

Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4143 ◽  
Author(s):  
SungJin Yu ◽  
YoungHo Park

Wireless sensor networks (WSN) are composed of multiple sensor nodes with limited storage, computation, power, and communication capabilities and are widely used in various fields such as banks, hospitals, institutes to national defense, research, and so on. However, useful services are susceptible to security threats because sensitive data in various fields are exchanged via a public channel. Thus, secure authentication protocols are indispensable to provide various services in WSN. In 2019, Mo and Chen presented a lightweight secure user authentication scheme in WSN. We discover that Mo and Chen’s scheme suffers from various security flaws, such as session key exposure and masquerade attacks, and does not provide anonymity, untraceability, and mutual authentication. To resolve the security weaknesses of Mo and Chen’s scheme, we propose a secure and lightweight three-factor-based user authentication protocol for WSN, called SLUA-WSN. The proposed SLUA-WSN can prevent security threats and ensure anonymity, untraceability, and mutual authentication. We analyze the security of SLUA-WSN through the informal and formal analysis, including Burrows–Abadi–Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. Moreover, we compare the performance of SLUA-WSN with some existing schemes. The proposed SLUA-WSN better ensures the security and efficiency than previous proposed scheme and is suitable for practical WSN applications.


2020 ◽  
Vol 14 (1) ◽  
pp. 39-50 ◽  
Author(s):  
Xiong Li ◽  
Jieyao Peng ◽  
Mohammad S. Obaidat ◽  
Fan Wu ◽  
Muhammad Khurram Khan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document