원문정보
초록
영어
To provide unlinkability for wireless sensor network, Jiang et al. proposed an efficient two factor user authentication scheme. The scheme provides some good aspects for wireless sensor network. However, this paper shows that Jiang et al.’s scheme has some security weaknesses and proposes an enhanced scheme to remove the weaknesses in Jiang et al.’s scheme. The proposed scheme does not use verification table and synchronized values between communication parties. It provides user anonymity and un-traceability by adopting dynamic identifier depending on each session dependent random number and time stamps. Comparing with the other authentication schemes, the proposed scheme is more secure while maintaining efficiency.
목차
1. Introduction
2. Jiang et al.'s Efficient Two-factor User Authentication Scheme
2.1 Registration Phase
2.2 Login and Authentication Phase
2.3 Password Update Phase
3. Weakness Analysis on Jiang et al.'s User Authentication Scheme
3.1 Effect on Verification Table
3.2 Necessity to Synchronization
4. Enhanced User Authentication Scheme
4.1 Registration Phase
4.2 Login and Authentication Phase
4.3 Password Update Phase
5. Security Analysis
5.1 Resilience of Stolen Verifier Attack
5.2 Resilience of Unsynchronization Attack
5.3 Resilience of Password Guessing Attack
5.4 Resilience of User Identity Guessing Attack
6. Conclusion
References