Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications

Cryptanalysis of Vaidya et al.’s User Authentication Scheme with Key Agreement in Wireless Sensor Networks

Authors
Jiping Li, Yaoming Ding, Zenggang Xiong, Shouyin Liu
Corresponding Author
Jiping Li
Available Online August 2015.
DOI
10.2991/meita-15.2015.113How to use a DOI?
Keywords
authentication, smart card, password, wireless sensor network
Abstract

User authentication in wireless sensor networks (WSN) is critical due to their unattended and even hostile deployment in the field. The open environment of WSN requires mechanisms which prevent unauthorized user from accessing the information from WSN. Recently, M.L.Das proposed a two-factor user authentication scheme in WSN and claimed that his scheme is secure against different kinds of attack. However, Khan et. al. and Vaidya et. al. show that the M.L.Das’s scheme does not provide mutual authentication between the gateway node and sensor nodes and is vulnerable to gateway node bypassing attack and privileged-insider attack. Chen-Shih point out that Das’s scheme cannot resist parallel session attack. Moreover, they proposed improved schemes based on Das’s user authentication scheme. Among the three improved schemes, Vaidya et. al.’s scheme is the most secure against different kinds of attack. Though Vaidya et. al. claim that their scheme is robust to various attacks, unfortunately, we find that their scheme still suffers from user impersonation attack, forgery attack with node capture and sensor node impersonation attack.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications
Series
Advances in Engineering Research
Publication Date
August 2015
ISBN
978-94-6252-103-2
ISSN
2352-5401
DOI
10.2991/meita-15.2015.113How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Jiping Li
AU  - Yaoming Ding
AU  - Zenggang Xiong
AU  - Shouyin Liu
PY  - 2015/08
DA  - 2015/08
TI  - Cryptanalysis of Vaidya et al.’s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
BT  - Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications
PB  - Atlantis Press
SP  - 619
EP  - 623
SN  - 2352-5401
UR  - https://doi.org/10.2991/meita-15.2015.113
DO  - 10.2991/meita-15.2015.113
ID  - Li2015/08
ER  -