| Literature DB >> 26633396 |
I-Pin Chang1, Tian-Fu Lee2, Tsung-Hung Lin3, Chuan-Ming Liu4.
Abstract
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.Entities:
Keywords: authentication; dynamic identity; key agreement; password; smartcard; wireless sensor networks
Mesh:
Year: 2015 PMID: 26633396 PMCID: PMC4721688 DOI: 10.3390/s151229767
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1An authentication and key agreement scheme for WSNs.
Notation.
| Identity and password pair of user | |
| Identity of sensor node | |
| Identity of smart card | |
| Secret key only know to | |
| Secret value of | |
| Session key | |
| Random numbers selected by | |
| The timestamp values | |
| A collision free one-way hash function | |
| Pseudo-random function of variable | |
| ⊕ | The exclusive-or (XOR) operation. |
| Message |
Figure 2The login phase of the proposed scheme for WSNs.
Figure 3The authentication and key agreement phase of the proposed scheme for WSNs.
The comparisons of related schemes and the proposed scheme.
| Vaidya | Li | Kim | Our Scheme | ||
|---|---|---|---|---|---|
| 7H + 7X | 9H + 5X | 9H + 9X | 11H + 5X | ||
| Computations | 2H | 6H + 4X | 3H + 2X | 4H + 1X | |
| 6H + 6X | 11H + 5X | 8H + 8X | 10H + 4X | ||
| Total | 15H + 13X | 26H + 14X | 20H + 29X | 25H + 10X | |
| Used random numbers | 5 | 4 | 5 | 3 | |
The simulation comparisons of related schemes and the proposed scheme.
| Simulation Time (ms) | Vaidya | Li | Kim | Our Scheme |
|---|---|---|---|---|
| 0.00140 | 0.00162 | 0.00180 | 0.00198 | |
| 0.00048 | 0.00144 | 0.00072 | 0.00100 | |
| 0.00084 | 0.00143 | 0.00104 | 0.00130 | |
| Total | 0.00272 | 0.00449 | 0.00356 | 0.00428 |
Simulation environment.
| Hardware/Software Specification | ||
|---|---|---|
| User | Mainboard | ASUSTeK Computer INC. CM5571 |
| CPU | Intel Core 2 Quad Q8300 @ 2.50 GHz 2.50 GHz | |
| Memory | 4.00 GB Dual-Channel DDR3 @ 533 MHz | |
| OS | Windows 7 64-bit SP1 | |
| Sensor Node | Mainboard | ASUSTeK Computer INC. UX303LN |
| CPU | Intel Core i3/i5/i7 4xxx @ 1.70 GHz | |
| Memory | 4.00 GB Single-Channel DDR3 @ 798 MHz | |
| OS | Windows 8.1 64-bit | |
| Gateway Node | Mainboard | IBM 46W9191 |
| CPU | Intel Xeon E3 1231 v3 @ 3.40 GHz 3.40 GHz | |
| Memory | 8.00 GB Dual-Channel DDR3 @ 800 MHz | |
| OS | Windows Server 2008 R2 Standard 64-bit SP1 | |
| Used Programming Language and Algorithms | ||
| C/C++ | ||
| Hash function: SHA-1 | ||
The comparisons of the related schemes and the proposed scheme.
| Vaidya | Li | Kim | Our Scheme | |
|---|---|---|---|---|
| Resisting replay attacks | Yes | Yes | Yes | Yes |
| Resisting impersonation attacks | No | No | No | Yes |
| Resisting gateway node by passing attacks | No | Yes | Yes | Yes |
| Resisting parallel session attacks | Yes | Yes | Yes | Yes |
| Resisting password guessing attacks | Yes | Yes | Yes | Yes |
| Resisting sensor node capture attacks | No | Yes | Yes | Yes |
| Resisting man-in-the-middle attacks | No | Yes | No | Yes |
| Resisting lost smartcard attacks | No | Yes | No | Yes |
| Resisting privileged-insider attacks | Yes | Yes | Yes | Yes |
| Resisting stolen-verifier attacks | Yes | No | Yes | Yes |
| Providing session key security | No | Yes | No | Yes |
| Providing privacy protection of users | No | No | No | Yes |