Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won
{"title":"多网关无线传感器网络认证方案的密码分析","authors":"Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won","doi":"10.1109/ICDIM.2017.8244650","DOIUrl":null,"url":null,"abstract":"Wireless sensor network has wide potential application in many fields such as military, agricultural and healthcare. However, it also has some vulnerabilities because of its openness. For this reason, many researchers have proposed various user authentication schemes for added security of wireless sensor networks. Recently, Wu et al. proposed an authentication scheme for multi-gateway wireless sensor networks in Internet of Things deployment. Wu et al. claimed that their scheme is secure against user forgery attack and session key leakage. However, we found that the scheme is vulnerable to outsider and user impersonation attacks. In this paper, we revisit Wu et al.'s scheme and analyze its vulnerabilities.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks\",\"authors\":\"Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won\",\"doi\":\"10.1109/ICDIM.2017.8244650\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor network has wide potential application in many fields such as military, agricultural and healthcare. However, it also has some vulnerabilities because of its openness. For this reason, many researchers have proposed various user authentication schemes for added security of wireless sensor networks. Recently, Wu et al. proposed an authentication scheme for multi-gateway wireless sensor networks in Internet of Things deployment. Wu et al. claimed that their scheme is secure against user forgery attack and session key leakage. However, we found that the scheme is vulnerable to outsider and user impersonation attacks. In this paper, we revisit Wu et al.'s scheme and analyze its vulnerabilities.\",\"PeriodicalId\":144953,\"journal\":{\"name\":\"2017 Twelfth International Conference on Digital Information Management (ICDIM)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Twelfth International Conference on Digital Information Management (ICDIM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDIM.2017.8244650\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIM.2017.8244650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks
Wireless sensor network has wide potential application in many fields such as military, agricultural and healthcare. However, it also has some vulnerabilities because of its openness. For this reason, many researchers have proposed various user authentication schemes for added security of wireless sensor networks. Recently, Wu et al. proposed an authentication scheme for multi-gateway wireless sensor networks in Internet of Things deployment. Wu et al. claimed that their scheme is secure against user forgery attack and session key leakage. However, we found that the scheme is vulnerable to outsider and user impersonation attacks. In this paper, we revisit Wu et al.'s scheme and analyze its vulnerabilities.