Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29404


Select areas to restrict search in scientific publication database:
13513
Comments on He et al.’s Robust Biometric-based User Authentication Scheme for WSNs
Abstract:
In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentication schemes have successfully drawn researchers- attention and been studied widely. In 2012, He et al. proposed a robust biometric-based user authentication scheme for WSNs. However, this paper demonstrates that He et al.-s scheme has some drawbacks: poor reparability problem, user impersonation attack, and sensor node impersonate attack.
Digital Object Identifier (DOI):

References:

[1] C. Y. Chong and S. Kumar, Sensor networks: Evolution, opportunities and challenges, Proceedings of IEEE, vol. 91, no. 8, pp. 1247-1256, 2003.
[2] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, TinyPK: Securing sensor networks with public key technology, ACM Workshop Security of Ad Hoc Sensor Networks, Washington D C: ACM Press, pp. 59-64, 2004.
[3] K. Wong, Y. Zheng, J. Cao, and S. Wang, A dynamic user authentication scheme for wireless sensor networks, IEEE International Conference Sensor Networks, Ubiquitous, Trustworthy Computing, Taibei: IEEE Computer Society, pp. 244-251, 2006.
[4] J. J. Yuan, C. J. Jiang, and Z. W. Jiang A biometric-based user authentication for wireless sensor networks, Wuhan University Journal of Natural Sciences, vol. 15, no. 3, pp. 272-276, 2010.
[5] M. K. Khan and J. Zhang, Improving the security of a flexible biometrics remote user authentication scheme, Computer Standards and Interfaces, vol. 29, no. 1, pp. 82-85, 2007.
[6] M. K. Khan, J. Zhang, and X. Wang, Chaotic Hash-based fingerprint biometric remote user authentication scheme on mobile devices, Chaos, Solitons and Fractals, vol. 35, no. 3, pp. 519-524, 2008.
[7] J. K. Lee, S. R. Ryu, and K. Y. Yoo, Fingerprint-based remote user authentication scheme using smart cards, Electronic Letters, vol. 38, no. 12, pp. 554-555, 2002.
[8] C. H. Lin and Y. Y. Lai, A flexible biometrics remote user authentication scheme, Computer Standards and Interfaces, vol. 27, no. 1, pp. 19-23, 2004.
[9] C. T. Li and M. S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1-5, 2010.
[10] D. He, Robust biometric-based user authentication scheme for wireless sensor networks, IACR Cryptology ePrint Archive 2012, vol. 203, pp. 1-15, 2012.
[11] W. C. Ku, Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, 2004, 50(1): 204-207.
[12] M. Kumar, On the weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards, CiteSeerX, pp. 1-12, 2004.
[13] P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Proceedings of Advances in Cryptology (Crypto-99), pp. 388-397, Santa Barbara, USA, 1999.
[14] T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Examining smart card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002.
[15] D. He, J. Chen, and J. Hu, Weaknesses of a remote user password authentication scheme using smart card, International Journal of Network Security, Vol. 13, No. 1, pp. 58-60, July 2011.
[16] A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of applied cryptography, CRC Press New York, 1997.
Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007