On the security of a realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks

Ling Xiong, Daiyuan Peng, Tu Peng, Hongbin Liang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Most recently, Gope and Hwang (IEEE Transactions on Industrial Electronics, 2016. doi:10.1109/TIE.2016.2585081) proposed a realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks(WSNs). They demonstrated that the scheme could resist various attacks. However, in this paper, we find out that Gope and Hwang's scheme suffers from several security flaws, including smart card loss attack, known session-specific temporary information attack, de-synchronization attack, and known transaction sequence number attack. Some possible countermeasures are provided to avoid these design flaws in the future design of lightweight authentication schemes.

Original languageEnglish
Title of host publication2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages342-346
Number of pages5
ISBN (Electronic)9781509063505
DOIs
Publication statusPublished - 2 Jul 2017
Event3rd IEEE International Conference on Computer and Communications, ICCC 2017 - Chengdu, China
Duration: 13 Dec 201716 Dec 2017

Publication series

Name2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017
Volume2018-January

Conference

Conference3rd IEEE International Conference on Computer and Communications, ICCC 2017
Country/TerritoryChina
CityChengdu
Period13/12/1716/12/17

Keywords

  • Authentication
  • User anonymity
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'On the security of a realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks'. Together they form a unique fingerprint.

Cite this