无线传感网络中基于非抗窜扰智能卡的双因素认证协议
作者:
作者单位:

作者简介:

王庆璇(1995—),男,博士生,主要研究方向为应用密码学、多因素身份认证协议;

通讯作者:

中图分类号:

TP311

基金项目:

国家自然科学基金资助项目(62172240);京津冀基础研究合作专项项目(S22ZX08013)


Non-tamper resistance smart-card based two-factor authentication in wireless sensor networks
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    智能卡是最为常见的密码设备之一,因其抗窜扰特性,智能卡常常被用于电子商务、医疗健康以及物联网等高安全需求的领域中为安全提供服务。随着侧信道攻击、逆向工程等技术的发展,研究表明智能卡内保存的参数可恢复,使其不再具有抗窜扰特性,因而,基于非抗窜扰智能卡假设的多因素认证协议设计得到了广泛的关注。为此,研究了在无线传感网络中典型的多因素协议,指出其不能抵抗离线口令猜测攻击和中间人攻击、无法实现双向认证,以及不能抵抗离线口令猜测攻击、无法实现用户匿名性等问题。为克服这些缺陷,在非抗窜扰智能卡假设下,结合哈希链技术提出了一类面向无线传感器网络的双因素认证协议,并在随机预言机模型中给出了严格的安全证明。与现有无线传感网络环境下多因素认证协议相比,该协议在保持较低计算开销的同时,实现了更高的安全性,适于资源受限的无线传感器网络环境。

    Abstract:

    Smart-card is one of the most common cryptographic devices. Due to its tamper resistance characteristics, it has been widely used in many security-critical areas, such as e-commerce, medical health, and Internet of Things (IoT). However, with the development of side-channel attacks and reverse engineering, research shows that the parameters in the smart-card can be extracted, and the smart-card has no longer tamper resistance. Therefore, how to design multi-factor authentication protocols based on the non-tamper resistance smartcard has got a lot of attention. This paper studied two typical multi-factor authentication protocols in wireless sensor networks, pointing out that one cannot resist offline password guessing attacks and man-in-the-middle attacks, and fails to achieve mutual autentication, while the other cannot resist offline password-guessing attacks and fails to provide anonymity. In order to overcome these weaknesses, combined with the Hash-chain technique, a new non-tamper resistance smart-card based two-factor authentication scheme was proposed and formally proved secure under the random oracle model. Compared with other related multi-factor authentication schemes in the wireless sensor network environment, the proposed scheme could achieve higher security while maintaining lower computation cost. Consequently, it could be suitable for resource constrained wireless sensor network environment.

    参考文献
    相似文献
    引证文献
引用本文
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2022-11-28
  • 出版日期: