scholarly journals A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments

Symmetry ◽  
2021 ◽  
Vol 13 (7) ◽  
pp. 1121
Author(s):  
Ya-Fen Chang ◽  
Wei-Liang Tai ◽  
Po-Lin Hou ◽  
Kuan-Yu Lai

Internet of Things (IoT) is composed of various kinds of devices such as cars, electrical appliances, machines and sensors. With IoT technologies, devices can exchange information through the network, people are allowed to get information collected by devices without interacting with them, and automatic operations for devices are realized. Because of the variety of IoT devices, some of them possess limited computational capability. On the other hand, data transmission in IoT networks is usually through a public channel. To ensure efficiency and security for IoT environments, Lee et al. proposed a three-factor authentication scheme with hash function and XOR operation. They claimed their scheme possessed superior properties and could resist common attacks. After analyzing their scheme, we find that their scheme is vulnerable to five flaws. In this paper, how these found flaws threaten Lee et al.’s scheme is shown in detail. Then, we propose an improvement to overcome the found flaws and preserve the advantages by employing ECC.

2020 ◽  
Vol 52 ◽  
pp. 102494 ◽  
Author(s):  
Hakjun Lee ◽  
Dongwoo Kang ◽  
Jihyeon Ryu ◽  
Dongho Won ◽  
Hyoungshick Kim ◽  
...  

Author(s):  
Jihyeon Ryu ◽  
Hakjun Lee ◽  
Hyoungshick Kim ◽  
Dongho Won

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.'s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.'s scheme in detail. We also propose a new scheme by fixing such vulnerabilities and improving the performance of the protocol.


Sign in / Sign up

Export Citation Format

Share Document