{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T04:30:02Z","timestamp":1768537802978,"version":"3.49.0"},"reference-count":16,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T00:00:00Z","timestamp":1397001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker\u2019s own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.<\/jats:p>","DOI":"10.3390\/s140406443","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T12:05:28Z","timestamp":1397045128000},"page":"6443-6462","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":74,"title":["Security Analysis and Improvements of Two-Factor  Mutual Authentication with Key Agreement in Wireless  Sensor Networks"],"prefix":"10.3390","volume":"14","author":[{"given":"Jiye","family":"Kim","sequence":"first","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University,  2066 Seobu-Ro, Jangan-Gu, Suwon-Si, Gyeonggi-Do 440-746, Korea"}]},{"given":"Donghoon","family":"Lee","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University,  2066 Seobu-Ro, Jangan-Gu, Suwon-Si, Gyeonggi-Do 440-746, Korea"}]},{"given":"Woongryul","family":"Jeon","sequence":"additional","affiliation":[{"name":"Department of Cyber Security and Police, Gwangju University, 277 Hyodeok-Ro, Nam-Gu, Gwangju-Si 503-703, Korea"}]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Cyber Investigation Police, Howon University, 64 Howon University 3Gil,  Impi-Myeon, Gunsan-Si, Jeonrabuk-Do 573-718, Korea"}]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University,  2066 Seobu-Ro, Jangan-Gu, Suwon-Si, Gyeonggi-Do 440-746, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2014,4,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","article-title":"Wireless sensor network survey","volume":"52","author":"Yick","year":"2008","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Yoon, E.J., and Yoo, K.Y. (2011, January 18-20). Cryptanalysis of robust mutual authentication protocol for wireless sensor networks. Banff AB, Canada.","DOI":"10.1109\/COGINF.2011.6016171"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","article-title":"Two-factor user authentication in wireless sensor networks","volume":"8","author":"Das","year":"2009","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","article-title":"Cryptanalysis and security improvements of \u201ctwo-factor user authentication in wireless sensor networks\u201d","volume":"10","author":"Khan","year":"2010","journal-title":"Sensors"},{"key":"ref_5","unstructured":"Nyang, D.H., and Lee, M.K. Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks. IACR Cryptology ePrint Archive. Available online: http:\/\/eprint.iacr.org\/2009\/631.pdf."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"9589","DOI":"10.3390\/s130809589","article-title":"An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks","volume":"13","author":"Li","year":"2013","journal-title":"Sensors"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Yoo, S.G., Lee, H., and Kim, J. A. Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks. Available online: http:\/\/www.hindawi.com\/journals\/ijdsn\/2013\/543950\/.","DOI":"10.1155\/2013\/543950"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Tseng, H.R., Jan, R.H., and Yang, W. (2007, January 26-30). An Improved dynamic user authentication scheme for wireless sensor networks. Washington, DC, USA.","DOI":"10.1109\/GLOCOM.2007.190"},{"key":"ref_9","first-page":"361","article-title":"An enhanced two-factor user authentication scheme in wireless sensor networks","volume":"10","author":"He","year":"2010","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_10","unstructured":"Wong, K.H.M., Zheng, Y., Cao, J., and Wang, S. (2006, January 5-7). A dynamic user authentication scheme for wireless sensor networks. Taichung, Taiwan."},{"key":"ref_11","first-page":"704","article-title":"A robust mutual authentication protocol for wireless sensor networks","volume":"32","author":"Chen","year":"2010","journal-title":"Electron. Telecommun. Res. Inst."},{"key":"ref_12","unstructured":"Vaidya, B., Makrakis, D., and Mouftah, H. Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks. Available online: http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.517\/full."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1016\/j.jnca.2012.03.011","article-title":"A dynamic password-based user authentication scheme for hierarchical wireless sensor networks","volume":"35","author":"Das","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","article-title":"An improved smart card based password authentication scheme with provable security","volume":"31","author":"Xu","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_15","first-page":"109","article-title":"An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks","volume":"19","author":"Turkanovic","year":"2013","journal-title":"Electron. Electr. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","article-title":"A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks","volume":"36","author":"Xue","year":"2013","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/14\/4\/6443\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:10:02Z","timestamp":1760217002000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/14\/4\/6443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,9]]},"references-count":16,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,4]]}},"alternative-id":["s140406443"],"URL":"https:\/\/doi.org\/10.3390\/s140406443","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,9]]}}}