{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:28:48Z","timestamp":1725722928376},"reference-count":44,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T00:00:00Z","timestamp":1513641600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the BUPT Excellent Ph.D. Students Foundation","award":["2015AA017202","2016B010110002","SGRIXTKJ[2017]265"]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61401038","61702045"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows\u2013Abadi\u2013Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.<\/jats:p>","DOI":"10.3390\/s17122946","type":"journal-article","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T15:48:40Z","timestamp":1513698520000},"page":"2946","source":"Crossref","is-referenced-by-count":56,"title":["An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6527-2897","authenticated-orcid":false,"given":"Chenyu","family":"Wang","sequence":"first","affiliation":[{"name":"New Research Activities Darparment, Beijing University of Posts and Telecommunications, Haidian District, Beijing 100876, China"}]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[{"name":"New Research Activities Darparment, Beijing University of Posts and Telecommunications, Haidian District, Beijing 100876, China"}]},{"given":"Jing","family":"Sun","sequence":"additional","affiliation":[{"name":"New Research Activities Darparment, Beijing University of Posts and Telecommunications, Haidian District, Beijing 100876, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,12,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.comcom.2016.04.005","article-title":"3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications","volume":"85","author":"Pecori","year":"2016","journal-title":"Comput. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Pecori, R. (2015, January 27\u201329). A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems. Proceedings of the 7th International Conference on New Technologies, Mobility and Security (NTMS), Paris, France.","DOI":"10.1109\/NTMS.2015.7266463"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","article-title":"On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions","volume":"73","author":"Wang","year":"2014","journal-title":"Comput. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","article-title":"Cryptanalysis and security improvements of \u201ctwo-factor user authentication in wireless sensor networks\u201d","volume":"10","author":"Khan","year":"2010","journal-title":"Sensors"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"5020","DOI":"10.3390\/s110505020","article-title":"RUASN: A robust user authentication framework for wireless sensor networks","volume":"11","author":"Kumar","year":"2011","journal-title":"Sensors"},{"key":"ref_6","first-page":"177","article-title":"A secure and efficient one-time password authentication scheme for WSN","volume":"19","author":"Ling","year":"2017","journal-title":"Int. J. Netw. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1002\/sec.1109","article-title":"A two-factor authentication scheme with anonymity for multi-server environments","volume":"8","author":"Chen","year":"2013","journal-title":"Secur. Commun. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","article-title":"Two-factor user authentication in wireless sensor networks","volume":"8","author":"Das","year":"2009","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1142\/S0129626411000047","article-title":"Two attacks on a two-factor user authentication in wireless sensor networks","volume":"21","author":"Lee","year":"2011","journal-title":"Parallel Process. Lett."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"889","DOI":"10.4218\/etrij.13.0113.0103","article-title":"A strong authentication scheme with user privacy for wireless sensor networks","volume":"35","author":"Kumar","year":"2013","journal-title":"ETRI J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1007\/s00779-012-0540-3","article-title":"On the security and improvement of a two-factor user authentication scheme in wireless sensor networks","volume":"17","author":"Sun","year":"2013","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1631\/jzus.C1000377","article-title":"An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks","volume":"12","author":"Fan","year":"2011","journal-title":"J. Zhejiang Univ. Sci. C"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1016\/j.jnca.2012.03.011","article-title":"A dynamic password-based user authentication scheme for hierarchical wireless sensor networks","volume":"35","author":"Das","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.adhoc.2014.03.003","article-title":"Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks","volume":"20","author":"Wang","year":"2014","journal-title":"Ad Hoc Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","article-title":"A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks","volume":"36","author":"Xue","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"9589","DOI":"10.3390\/s130809589","article-title":"An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks","volume":"13","author":"Li","year":"2013","journal-title":"Sensors"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1166\/sl.2013.2669","article-title":"An improved tTwo-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography","volume":"11","author":"Li","year":"2013","journal-title":"Sens. Lett."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4767","DOI":"10.3390\/s110504767","article-title":"A secured authentication protocol for wireless sensor networks using elliptic curves cryptography","volume":"11","author":"Chen","year":"2011","journal-title":"Sensors"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"10081","DOI":"10.3390\/s140610081","article-title":"Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography","volume":"14","author":"Choi","year":"2014","journal-title":"Sensors"},{"key":"ref_20","first-page":"51","article-title":"A new user authentication protocol for wireless sensor networks using elliptic curves cryptography","volume":"2013","author":"Shi","year":"2013","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","article-title":"An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks","volume":"8","author":"Jiang","year":"2015","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s12083-015-0404-5","article-title":"A new and secure authentication scheme for wireless sensor networks with formal proof","volume":"10","author":"Wu","year":"2017","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_23","first-page":"263","article-title":"A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks","volume":"321","author":"He","year":"2015","journal-title":"Inf. Sci. Int. J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"29841","DOI":"10.3390\/s151229767","article-title":"Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks","volume":"15","author":"Chang","year":"2015","journal-title":"Sensors"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Jung, J., Moon, J., Lee, D., and Won, D. (2017). Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks. Sensors, 17.","DOI":"10.3390\/s17030644"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Park, Y., and Park, Y. (2016). Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors, 16.","DOI":"10.3390\/s16122123"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/TDSC.2013.2297110","article-title":"Robust multi-factor authentication for fragile communications","volume":"11","author":"Huang","year":"2013","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","article-title":"Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment","volume":"12","author":"Wang","year":"2015","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","article-title":"Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks","volume":"5","author":"Jiang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Wang, D., and Wang, P. (2016). Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans. Depend. Secur. Comput.","DOI":"10.1109\/TDSC.2016.2605087"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.future.2016.10.004","article-title":"Design of a provably secure biometrics-based multi-cloud-server authentication scheme","volume":"68","author":"Kumari","year":"2017","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","article-title":"Robust biometrics-based authentication scheme for multiserver environment","volume":"9","author":"He","year":"2015","journal-title":"IEEE Syst. J."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Chen, Z., Li, B., Shen, J., Yang, L., and Ma, J. (2017). Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J. Ambient Intell. Humaniz. Comput.","DOI":"10.1007\/s12652-017-0516-2"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1049\/iet-cdt.2012.0073","article-title":"Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices","volume":"7","author":"Lee","year":"2013","journal-title":"IET Comput. Digit. Tech."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","article-title":"Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures","volume":"11","author":"He","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, D., Xu, G., and Guo, Y. (2017). A lightweight password-based authentication protocol using smart card. Int. J. Commun. Syst.","DOI":"10.1002\/dac.3336"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","article-title":"Zipf\u2019s law in passwords","volume":"12","author":"Wang","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1002\/dac.2853","article-title":"Design of a user anonymous password authentication scheme without smart card","volume":"29","author":"Kumari","year":"2016","journal-title":"Int. J. Commun. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/TIE.2009.2028351","article-title":"Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards","volume":"57","author":"Li","year":"2010","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","article-title":"An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards","volume":"35","author":"Li","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Ma1, C., Wang, D., and Zhao, S. (2012). Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst., 27, 2215\u20132227.","DOI":"10.1002\/dac.2468"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Wang, C., and Xu, G. (2017). Cryptanalysis of three password-based remote user authentication schemes with non-tamper-resistant smart card. Secur. Commun. Netw.","DOI":"10.1155\/2017\/1619741"},{"key":"ref_43","first-page":"18","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"IEEE Trans. Comput."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","article-title":"Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks","volume":"101","author":"Amin","year":"2016","journal-title":"Comput. Netw."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/12\/2946\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T09:04:39Z","timestamp":1717923879000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/12\/2946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,19]]},"references-count":44,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2017,12]]}},"alternative-id":["s17122946"],"URL":"https:\/\/doi.org\/10.3390\/s17122946","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,19]]}}}