| Literature DB >> 25849359 |
Junghyun Nam1, Kim-Kwang Raymond Choo2, Sangchul Han1, Moonseong Kim3, Juryon Paik4, Dongho Won4.
Abstract
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).Entities:
Mesh:
Year: 2015 PMID: 25849359 PMCID: PMC4389980 DOI: 10.1371/journal.pone.0116709
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Our proposed authentication and key exchange protocol for wireless sensor networks.
A comparative summary of smart-card-based user authentication schemes for wireless sensor networks.
|
|
|
| |||||
|---|---|---|---|---|---|---|---|
|
|
| SKS | UA | FS | RSSC | RNC | |
| Jiang et al. [ | 5 | 22 | Yes | No | No | No | Yes |
| Khan & Kumari [ | 7 | 3 | Yes | No | No | No | Yes |
| Kim et al. [ | 2 | 18 | Yes | No | No | No | Yes |
| Chi et al. [ | 2 | 4 | Yes | No | No | No | Yes |
| He et al. [ | 2 | 10 | Yes | No | No | No | Yes |
| Kumar et al. [ | 2 | 7 | Yes | No | No | No | Yes |
| Li et al. [ | 6 | 26 | Yes | No | No | No | Yes |
| Xue et al. [ | 6 | 22 | Yes | No | No | No | Yes |
| Vaidya et al. [ | 2 | 15 | Yes | No | No | No | No [ |
|
| 1 | 3 | Yes | Proven | No | Yes | Yes |
| Choi et al. [ | 2 | 6 | Yes | No | Yes | No | Yes |
| Shi & Gong [ | 2 | 6 | No [ | No | Yes | No | Yes |
| Yeh et al. [ | 2 | 8 | No [ | No | No [ | No | Yes |
SKS: session key security; UA: user anonymity; FS: forward secrecy; RSSC: resistance to stolen smart card attacks; RNC: resistance to node capture attacks.
M: scalar-point multiplication; P: map-to-point operation; E: symmetric encryption/decryption; A: MAC generation/verification; H: hash function evaluation.
Crypto++ 5.6.0 benchmarks for SHA-1, HMAC and AES.
|
| SHA-1 | HMAC (SHA-1) | AES (with 128-bit key) | ||||
|---|---|---|---|---|---|---|---|
| CTR | CBC | OFB | CFB | ECB | |||
|
| 11.4 | 11.9 | 12.6 | 16.0 | 16.9 | 16.1 | 16.0 |