{"title":"层次wsn密码认证方案的安全缺陷","authors":"Chun-Ta Li, C. Weng, Cheng-Chi Lee, Chin-Wen Lee, Ping-Nan Chiu, Cheng-Yi Wu","doi":"10.7763/JACN.2013.V1.25","DOIUrl":null,"url":null,"abstract":"With the growing popularity of sensor-based monitoring devices, sensor networks are becoming an essential part of wireless heterogeneous networks and numerous researches have been widely studied in recent years. Recently, Das et al. proposed a dynamic password-based user authentication scheme with dynamic node addition for hierarchical wireless sensor networks (WSNs). They claimed that their scheme achieves better security as compared to those for other existing password-based user authentication approaches. However, we observe that Das et al.'s scheme is vulnerable to smart card breach attack, privileged-insider attack, and many logged-in users' attack and is not easily reparable.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security Flaws of a Password Authentication Scheme for Hierarchical WSNs\",\"authors\":\"Chun-Ta Li, C. Weng, Cheng-Chi Lee, Chin-Wen Lee, Ping-Nan Chiu, Cheng-Yi Wu\",\"doi\":\"10.7763/JACN.2013.V1.25\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growing popularity of sensor-based monitoring devices, sensor networks are becoming an essential part of wireless heterogeneous networks and numerous researches have been widely studied in recent years. Recently, Das et al. proposed a dynamic password-based user authentication scheme with dynamic node addition for hierarchical wireless sensor networks (WSNs). They claimed that their scheme achieves better security as compared to those for other existing password-based user authentication approaches. However, we observe that Das et al.'s scheme is vulnerable to smart card breach attack, privileged-insider attack, and many logged-in users' attack and is not easily reparable.\",\"PeriodicalId\":232851,\"journal\":{\"name\":\"Journal of Advances in Computer Networks\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Advances in Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.7763/JACN.2013.V1.25\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Advances in Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7763/JACN.2013.V1.25","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Flaws of a Password Authentication Scheme for Hierarchical WSNs
With the growing popularity of sensor-based monitoring devices, sensor networks are becoming an essential part of wireless heterogeneous networks and numerous researches have been widely studied in recent years. Recently, Das et al. proposed a dynamic password-based user authentication scheme with dynamic node addition for hierarchical wireless sensor networks (WSNs). They claimed that their scheme achieves better security as compared to those for other existing password-based user authentication approaches. However, we observe that Das et al.'s scheme is vulnerable to smart card breach attack, privileged-insider attack, and many logged-in users' attack and is not easily reparable.