Wireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in\nwireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable\ncommunication networks, resource limitation, and unattended operation. As a result, various authentication schemes have been\nproposed to provide secure and efficient communication.He et al. suggested a robust biometrics-based user authentication scheme,\nbut Yoon andKimindicated that their scheme had several security vulnerabilities.The latter then proposed an advanced biometricsbased\nuser authentication scheme; in this paper, we analyze this advanced scheme and performa cryptanalysis. Our analysis shows\nthat Yoon and Kim�s scheme has various security weaknesses such as a biometric recognition error, a user verification problem,\nlack of anonymity and perfect forward secrecy, session key exposure by the gateway node, vulnerability to denial of service attacks,\nand a revocation problem. Therefore, we suggest countermeasures that can be implemented to solve these problems and then\npropose a security-enhanced biometrics-based user authentication scheme using fuzzy extraction that conforms to the proposed\ncountermeasures. Finally, we conduct a security analysis for the proposed biometrics-based user authentication scheme.
Loading....