Paper 2011/293

Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

W. Han

Abstract

Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to their un-attended and hostile deployments. Usually, sensor nodes are equipped with limited computing power, storage, and communication module, thus authenticating remote users in such resource constrained environment is a critical security concern. Recently, Yeh et al. proposed a two-factor user authentication scheme in WSN and claimed that his scheme is secure against different kind of attacks. However, in this paper, we prove that Yeh et al. scheme has some critical security pitfalls and is not recommended for real application. We point out that have the following weakness: 1) no mutual authentication between the user and the sensor node, 2) no perfect forward secrecy, 3)no key agreement between the user and the sensor node.

Metadata
Available format(s)
-- withdrawn --
Category
Cryptographic protocols
Publication info
Published elsewhere. The paper has not published.
Keywords
authenticationsecurityelliptic curve cryptosystemwireless sensor network
Contact author(s)
hww_2006 @ 163 com
History
2011-07-26: withdrawn
2011-06-03: received
See all versions
Short URL
https://ia.cr/2011/293
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.