2016
DOI: 10.5755/j01.itc.45.1.11949
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks

Abstract: In order to address the scenario in which the user wants to access the real-time data directly from the sensor node in wireless sensor networks (WSNs), Das proposed a two-factor authentication scheme. In 2010, Khan et al. pointed out that Das's scheme has some security flaws and proposed an improved scheme. Recently, Yuan demonstrated that Khan et al.'s improvement is still insure against several attacks. Yuan also proposed an enhanced two-factor user authentication scheme using user's biometrics to fix the se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…A fuzzy extractor extracts a string σ from its biometric input Bio i in an error-tolerant way. This method was used in order to avoid the problem of bio-hash [30] and utilization of noisy biometrics. The fuzzy extractor method involves the following two operations:…”
Section: Fuzzy Extractormentioning
confidence: 99%
See 1 more Smart Citation
“…A fuzzy extractor extracts a string σ from its biometric input Bio i in an error-tolerant way. This method was used in order to avoid the problem of bio-hash [30] and utilization of noisy biometrics. The fuzzy extractor method involves the following two operations:…”
Section: Fuzzy Extractormentioning
confidence: 99%
“…A practical implementation is a fuzzy extractor for biometric key extraction. Fuzzy extractors have the advantage of protecting the biometric template by rendering its storage useless [30,31]. Their performance in terms of key entropy and key stability is consistently improved.…”
Section: Introductionmentioning
confidence: 99%
“…[26][27][28][29] We note that such an attack model has been widely approved and used in the design and analysis of multifactor authentication schemes. 3,18,[30][31][32][33][34] Specifically, the attack model is specified by allowing an adversary  to perform the following operations:…”
Section: Attack Modelmentioning
confidence: 99%
“…As a basic defense strategy for numerous network services, the authentication protocol is aimed at solving these security issues. It has been used in various areas, such as e-banking, ehealth, wireless sensor networks, and internet of things [1][2][3]. Authentication protocol generally provides three useful functionalities, that is, mutual authentication, user anonymity, and session key agreement.…”
Section: Introductionmentioning
confidence: 99%