| Literature DB >> 23887085 |
Chun-Ta Li1, Chi-Yao Weng, Cheng-Chi Lee.
Abstract
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.Entities:
Mesh:
Year: 2013 PMID: 23887085 PMCID: PMC3812569 DOI: 10.3390/s130809589
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Notations used throughout this paper.
| User | |
| Sensor node | |
| GWN | Gateway node |
| Identity/Password of the user | |
| Pre-configured identity/password of the sensor node | |
| Two private system parameters only know to GWN | |
| A temporal credential issued by GWN to | |
| The timestamp value | |
| The shared session key between | |
| The expiration time of | |
| ⊕ | The bitwise exclusive-OR operation |
| The one-way hashing function | |
| ‖ | The bitwise concatenation operation |
The identity table of GWN after finishing the registration phase.
| … | … | … | … | … |
| 0/1 | N/A | |||
| … | … | … | … | … |
Figure 1.Communication handshakes of the registration phase of the user U.
Figure 2.Communication handshakes of the registration phase of sensor node S.
Figure 3.Illustration of the login phase of our advanced scheme.
The identity table of GWN after finishing the authentication and key agreement phase.
| … | … | … | … | … |
| 0/1 | ||||
| … | … | … | … | … |
Figure 4.Illustration of the authentication and key agreement phase of our advanced scheme.
Functionality comparisons of our advanced scheme and related schemes.
| Mutual authentication | No | Yes | Yes | Yes |
| Key agreement | No | Yes | Yes | Yes |
| Password protection | No | No | No | Yes |
| Provision of service billing | No | No | Yes | Yes |
| Resistant to stolen verifier attack | Yes | Yes | No | Yes |
| Resistant to insider attack | No | Yes | No | Yes |
| Resistant to lost smart card attack | No | No | No | Yes |
| Resistant to many logged-in users' attack | No | No | No | Yes |
Performance comparisons of our advanced scheme and related schemes.
| User ( | 4 | 1 | 7 | 9 |
| Sensor ( | 1 | 3 | 5 | 6 |
| Gateway node (GWN) | 7 | 4 | 10 | 11 |
| Computation costs | 12 | 8 | 22 | 26 |
| Computation time | 0.0024 s | 4.8016 s | 0.0044 s | 0.0052 s |
T: Time for SHA-256 one-way hashing computation; T: Time for ECC-160 encryption/decryption computation; s: Second.