CORC  > 北京大学  > 信息科学技术学院
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Wang, Ding ; Wang, Ping
刊名computer networks
2014
关键词Two-factor authentication Wireless sensor networks User anonymity Smart card Non-tamper resistant REMOTE USER AUTHENTICATION KEY AGREEMENT SCHEME SMART CARDS MUTUAL AUTHENTICATION SECURITY ENHANCEMENT ROAMING SERVICES HASH FUNCTIONS MESH NETWORKS EFFICIENT PROTOCOL
DOI10.1016/j.comnet.2014.07.010
英文摘要Anonymity is among the important properties of two-factor authentication schemes for wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have been devoted to designing schemes with user anonymity by only using lightweight symmetric-key primitives such as hash functions and block ciphers, to the best of our knowledge none has succeeded so far. In this work, we take an initial step to shed light on the rationale underlying this prominent issue. Firstly, we scrutinize two previously-thought sound schemes, namely Fan et al.'s scheme and Xue et al.'s scheme, and demonstrate the major challenges in designing a scheme with user anonymity. Secondly, using these two foremost schemes as case studies and on the basis of the work of Halevi-Krawczyk (1999) [44] and Impagliazzo-Rudich (1989) [43], we put forward a general principle: Public-key techniques are intrinsically indispensable to construct a two-factor authentication scheme that can support user anonymity. Furthermore, we discuss the practical solutions to realize user anonymity. Remarkably, our principle can be applied to two-factor schemes for universal environments besides WSNs, such as the Internet, global mobility networks and mobile clouds. We believe that our work contributes to a better understanding of the inherent complexity in achieving user privacy, and will establish a groundwork for developing more secure and efficient privacy-preserving two-factor authentication schemes. (C) 2014 Elsevier B.V. All rights reserved.; http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000343841800004&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=8e1609b174ce4e31116a60747a720701 ; Computer Science, Hardware & Architecture; Computer Science, Information Systems; Engineering, Electrical & Electronic; Telecommunications; SCI(E); EI; 15; ARTICLE; wangdingg@mail.nankai.edu.cn; pwang@pku.edu.cn; 41-57; 73
语种英语
内容类型期刊论文
源URL[http://ir.pku.edu.cn/handle/20.500.11897/151958]  
专题信息科学技术学院
软件与微电子学院
推荐引用方式
GB/T 7714
Wang, Ding,Wang, Ping. On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions[J]. computer networks,2014.
APA Wang, Ding,&Wang, Ping.(2014).On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions.computer networks.
MLA Wang, Ding,et al."On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions".computer networks (2014).
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace