Home > Published Issues > 2016 > Volume 11, No. 1, January 2016 >

Cryptanalysis of Kim Jiye et al.’s Two-Factor Mutual Authentication with Key Agreement in WSNs

Jiping Li 1, Yaoming Ding 1, Zenggang Xiong 1, Shouyin Liu 2, and Honglai Li 1
1. School of Computer and Information Science, Hubei Engineering University, Xiaogan, China
2. College of Physical Science and Technology, Central China Normal University, Wuhan, China

Abstract—User authentication and key management play an important role in the security of WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from dedicated sensors. For this case, several user authentication schemes have been proposed in recent years. Among these schemes, Kim Jiye et. al’s scheme is very novel. However, in the current work, we find that Kim Jiye et. al’s scheme is still vulnerable to some attacks such as offline password guessing attack, user impersonation attack using his/her own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we give detailed cryptanalysis of Kim Jiye et. al’s two-factor mutual authenti- cation with key agreement in WSNs.

Index Terms—WSN, mutual authentication, key-agreement, smart card, password

Cite: Jiping Li, Yaoming Ding, Zenggang Xiong, Shouyin Liu, and Honglai Li, “Cryptanalysis of Kim Jiye et al.’s Two-Factor Mutual Authentication with Key Agreement in WSNs," Journal of Communications, vol. 11, no. 1, pp.58-63, 2016. Doi: 10.12720/jcm.11.1.58-63