| Literature DB >> 24721764 |
Jiye Kim1, Donghoon Lee2, Woongryul Jeon3, Youngsook Lee4, Dongho Won5.
Abstract
User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.Entities:
Year: 2014 PMID: 24721764 PMCID: PMC4029696 DOI: 10.3390/s140406443
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Notations [12].
| Gateway node | |
| Identity of | |
| Password of | |
| Identity of | |
| Identity of smart card | |
| Secret key known to only | |
| Secret value generated by and shared between only and | |
| One-way hash function | |
| Random nonce of | |
| Random nonce of | |
| ⊕ | XOR operation |
| ∥ | Concatenation operation |
| =?, ≤? | Verification operation |
| Session key | |
| Pseudo-random function of variable with key | |
| Current timestamp of | |
| Current timestamp of | |
| Current timestamp of | |
| Δ | The maximum of transmission delay time permitted |
|
| Secure channel |
|
| Insecure channel |
Figure 1.Registration phase of Vaidya et al.'s scheme [12].
Figure 2.Login phase of Vaidya et al.'s scheme [12].
Figure 3.Authentication-key agreement phase of Vaidya et al.'s scheme [12].
Figure 4.Registration phase of the proposed scheme.
Figure 5.Login phase of the proposed scheme.
Figure 6.Authentication-key agreement phase of the proposed scheme.
Security comparison of the proposed scheme.
| Replay attacks | Yes | Yes | Yes | Yes |
| User impersonation attacks | No | No | No | Yes |
| Gateway node bypassing attacks | No | No | No | Yes |
| Parallel session attacks | No | No | Yes | Yes |
| Password guessing attacks | No | No | Yes | Yes |
| Sensor node capture attacks | No | No | No | Yes |
| Stolen smart card attacks | No | No | Yes | Yes |
| Lost smart card problems | No | No | Yes | Yes |
| Privileged-insider attacks | No | Yes | Yes | Yes |
| Stolen-verifier attacks | Yes | Yes | Yes | Yes |
| Mutual authentication | No | No | Yes | Yes |
| Key agreement | No | No | Yes | Yes |
| Password change phase | No | Yes | Yes | Yes |
(Yes: The scheme resists the attacks or provides the functionality; No: The scheme does not resist the attacks or provide the functionality).
Computation cost comparison of the proposed scheme.
| Registration phase | 0 | 1H | 1H | 2H + 1X | |
| 3H + 1X | 2H + 1X | 4H + 3X | 6H + 3X | ||
| 0 | 0 | 0 | 0 | ||
|
| |||||
| Login phase | 3H + 1X | 3H + 1X | 6H + 4X | 7H + 5X | |
| 0 | 0 | 0 | 0 | ||
| 0 | 0 | 0 | 0 | ||
|
| |||||
| Authentication and key agreement phase | 0 | 0 | 1H + 3X | 1H + 4X | |
| 4H + 2X | 5H + 2X | 6H + 6X | 8H + 8X | ||
| 1H | 2H | 2H + 2X | 2H + 2X | ||
|
| |||||
| Password change phase | - | 3H + 2X | 8H + 6X | 9H + 7X | |
| - | 0 | 0 | 0 | ||
| - | 0 | 0 | 0 | ||
|
| |||||
| Total | 11H + 4X | 16H + 6X | 28H + 24X | 35H + 30X | |
(H: The number of hash operations; X: The number of XOR operations).