A Security Analysis of "A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks"

Seunghwan Son, Deok Kyu Kwon, Youngho Park

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless sensor network (WSN) is a main component of the internet of things (IoT) technology, it can be predicted to apply in various areas including smart city, smart home, healthcare, vehicular network, and so on. However, in WSN environments, sensors and data users communicate wirelessly and it can be prone to malicious attacks such as forgery, impersonation, denial-of-service. Therefore, many researchers have proposed to establish a session key securely in WSN environments. In 2024, Thakur et al. designed a three-factor based authentication protocol for IoT-enabled WSNs. They indicated that Sahoo et al.'s protocol has weaknesses, and therefore, they suggested an enhanced scheme that resolved the previous security weaknesses. Nevertheless, we reviewed Thakur et al.'s scheme and we analyze that their scheme fails to support mutual authentication and does not provide perfert forward secrecy. Furthermore, their scheme is also prone to DoS attack because of lack of mutual authentication. We provide a detailed analysis of Thakur et al.'s scheme and propose countermeasures to address them.

Original languageEnglish
Title of host publication39th International Conference on Information Networking, ICOIN 2025
PublisherIEEE Computer Society
Pages291-295
Number of pages5
ISBN (Electronic)9798331506940
DOIs
StatePublished - 2025
Event39th International Conference on Information Networking, ICOIN 2025 - Chiang Mai, Thailand
Duration: 15 Jan 202517 Jan 2025

Publication series

NameInternational Conference on Information Networking
ISSN (Print)1976-7684

Conference

Conference39th International Conference on Information Networking, ICOIN 2025
Country/TerritoryThailand
CityChiang Mai
Period15/01/2517/01/25

Keywords

  • Internet of Things (IoT)
  • mutual authentication
  • security
  • sensor
  • wireless sensors networks (WSNs)

Fingerprint

Dive into the research topics of 'A Security Analysis of "A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks"'. Together they form a unique fingerprint.

Cite this