Abstract
Two-factor authenticated key exchange (TFAKE) protocols are widely used in wireless sensor networks (WSNs) to provide user authentication and data confidentiality. However, many existing TFAKE protocols are found to be insecure against different attacks. In this paper, we investigate how to design provably secure TFAKE protocols using asymmetric cryptology mechanisms. Our main technique tool is robust authenticated encryption schemes and fuzzy verifiers. We first present a formal security model for TFAKE protocol in WSNs and then propose a novel TFAKE protocol based on authenticated encryption schemes. We prove the security of the proposed protocol in the random oracle model. The performance comparison result shows that our protocol not only enjoys provable security but also has high efficiency. protocols, our protocol is more efficient and enjoys provable security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Das, M. L.: Two-Factor User Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, vol. 8, no. 3, 2009, pp. 1086-1090.
Khan, M. K., Alghathbar, K.: Cryptanalysis And Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’. Sensors, 10(3), 2010, pp. 2450-2459.
He, D., Gao, Y., Chan, S., Chen, C., & Bu, J.: An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. Ad Hoc & Sensor Wireless Networks, 10(4), 2010, pp. 361-371.
Vaidya, B., Makrakis, D., Mouftah, H.: (2012). Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks. Security and Communication Networks, 9(2), 2016, pp. 171-183.
Sun, D. Z., Li, J. X., Feng, Z. Y., Cao, Z. F., & Xu, G. Q: On the Security And Improvement of a Two-Factor User Authentication Scheme in Wireless Sensor Networks. Personal and Ubiquitous Computing, 17(5), 2013, pp. 895-905.
He, D., Kumar, N., Khan, M. K., & Lee, J. H.: Anonymous Two-Factor Authentication for Consumer Roaming Service in Global Mobility Networks. IEEE Transactions on Consumer Electronics, 59(4), 2013, pp. 811-817.
Yuan, J. J.: An Enhanced Two-Factor User Authentication in Wireless Sensor Networks. Telecommunication Systems, 55(1), 2014, pp. 105-113.
Jiang, Q., Ma, J., Lu, X., Tian, Y.: An Efficient Two-Factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks. Peer-to-Peer Networking and Applications, 8(6), 2014, pp. 1070-1081.
Wei, F., Ma, J., Jiang, Q., Shen, J., & Ma, C.: Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. Information Technology And Control, 45(1), 2016, pp. 62-70.
Wang, D., & Wang, P.: On the Anonymity of Two-Factor Authentication Schemes for Wireless Sensor Networks: Attacks, Principle and Solutions. Computer Networks, 73, 2014, pp. 41-57.
Wang, D., & Wang, P.: Understanding Security Failures of Two-Factor Authentication Schemes for Real-Time Applications in Hierarchical Wireless Sensor Networks. Ad Hoc Networks, 20, 2014, pp. 1-15.
Hoang V T, Krovetz T, Rogaway P: Robust Authenticated-Encryption AEZ and the Problem That it Solves. Advances in Cryptology-EUROCRYPT 2015. Springer Berlin Heidelberg, 2015, pp. 15-44.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wei, F., Zhang, R., Shen, J. (2017). A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_87
Download citation
DOI: https://doi.org/10.1007/978-3-319-49106-6_87
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49105-9
Online ISBN: 978-3-319-49106-6
eBook Packages: EngineeringEngineering (R0)