2016
DOI: 10.1177/1550147716658607
|View full text |Cite
|
Sign up to set email alerts
|

Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks

Abstract: Wireless sensor networks (WSNs) are ad-hoc networks composed primarily of a large number of sensor nodes with limited power, computation, storage and communication capabilities. The issue of securing and authenticating communications in such a network is problematic, and thus an adversary has an opportunity to capture a sensor node directly from the target field and extract all the information from its memory. In 2013, Yoon and Kim proposed an advanced biometric-based user authentication scheme for WSNs. Choi … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
38
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(38 citation statements)
references
References 37 publications
0
38
0
Order By: Relevance
“…Recently, to improve the security of two-factor authentication schemes that are vulnerable to guessing attacks and subject to inefficient password change policies in WSNs, biometric-based user authentication schemes, combined with smart cards and passwords, have drawn considerable attention in research [15,16,17,18,19]. Biometric-based user authentication in the WSN becomes inherently more reliable and secure than traditional two-factor user authentication schemes [20].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, to improve the security of two-factor authentication schemes that are vulnerable to guessing attacks and subject to inefficient password change policies in WSNs, biometric-based user authentication schemes, combined with smart cards and passwords, have drawn considerable attention in research [15,16,17,18,19]. Biometric-based user authentication in the WSN becomes inherently more reliable and secure than traditional two-factor user authentication schemes [20].…”
Section: Introductionmentioning
confidence: 99%
“…Park et al [14] claimed that if A wants to masquerade as the sensor node Sj, A is required to compute hfalse(SIDjfalse|false|yfalse). This is because the symmetric key kg=h(h(SIDj||y)||Tg).…”
Section: Cryptanalysis Of Park Et Al’s Authentication Schemementioning
confidence: 99%
“…Park et al [14] claimed that, although A could get the identity IDi in some way, GW checks the legitimacy of the user on the requested identity, and A cannot compute Mi and the revocation/reissue request message Zi without the biometric information of Ui. However, A can modify the revocation/reissue request message.…”
Section: Cryptanalysis Of Park Et Al’s Authentication Schemementioning
confidence: 99%
“…A wireless sensor network (WSN) is a distributed network of autonomous sensors that are typically used to collect information about environmental or physical conditions. Wireless sensor networks are applicable to a variety of applications such as environmental monitoring, health care, smart grid and surveillance [1][2][3][4] because they can be easily deployed without a significant cost penalty.…”
Section: Introductionmentioning
confidence: 99%
“…In general, a WSN system consists of four entities: (1) user interface, (2) sensor node that measures physical or environmental conditions, (3) gateway node that forwards the information received from the sensor nodes to a central server, (4) central server that collects the information from the sensor nodes and analyze it. Naturally, however, the security of WSN is critical because network packets can be easily captured and modified in WSN due to the inherent characteristics of wireless networks.…”
Section: Introductionmentioning
confidence: 99%