| Literature DB >> 27537890 |
Jaewook Jung1, Jiye Kim2, Younsung Choi3, Dongho Won4.
Abstract
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.Entities:
Keywords: BAN-logic; key agreement; mutual authentication; smart card; wireless sensor networks
Year: 2016 PMID: 27537890 PMCID: PMC5017464 DOI: 10.3390/s16081299
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Notations.
| Value | Description |
|---|---|
| Remote user | |
| Sensor node | |
| Gateway node | |
| Identity and password of | |
| Identity of | |
| Dynamic identity of | |
| The symmetric key | |
| Encryption/Decryption with the symmetric key | |
| The secret parameter generated by the | |
| The shared key between the | |
| The secret key instead of | |
| A random number chosen by | |
| Cryptographic random numbers or nonces | |
| One-way hash function | |
| Concatenate operation | |
| ⊕ | XOR operation |
| Current timestamp | |
| Session key | |
| The maximum of transmission delay time |
Figure 1Registration phase for Chen et al.’s scheme.
Figure 2Login and verification phase for Chen et al.’s scheme.
Figure 3Password change phase for Chen et al.’s scheme.
Figure 4Registration phase for the proposed scheme.
Figure 5Login and verification phase for the proposed scheme.
Figure 6Password change phase for the proposed scheme.
Security comparison of our proposed scheme and other related schemes.
| Features | Das et al. [ | K-A- [ | Vaidya et al. [ | C-S- [ | Fan et al. [ | Yeh et al. [ | Das et al. [ | Xue et al. [ | Chen et al. [ | Proposed Scheme |
|---|---|---|---|---|---|---|---|---|---|---|
| Proposition 1 | × | √ | × | √ | √ | × | × | × | × | √ |
| Proposition 2 | √ | × | × | × | × | √ | √ | × | √ | √ |
| Proposition 3 | × | × | × | × | √ | √ | √ | √ | √ | √ |
| Proposition 4 | × | × | × | × | √ | × | √ | × | × | √ |
| Proposition 5 | × | √ | × | × | √ | × | × | × | √ | √ |
| Proposition 6 | × | × | × | × | × | × | × | × | √ | √ |
| Proposition 7 | √ | √ | √ | × | √ | √ | √ | √ | × | √ |
| Proposition 8 | √ | √ | √ | √ | √ | × | √ | √ | √ | √ |
| Proposition 9 | × | √ | √ | × | √ | √ | × | × | √ | √ |
| Proposition 10 | √ | × | √ | × | √ | √ | √ | √ | × | √ |
| Proposition 11 | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ |
| Proposition 12 | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ |
| Proposition 13 | × | √ | √ | × | × | × | √ | √ | √ | √ |
| Proposition 14 | × | × | √ | × | √ | √ | √ | √ | √ | √ |
Comparison of the computational cost between our proposed scheme and other related schemes.
| Schemes | User | Gateway Node | Sensor Node | Base Station | Total |
|---|---|---|---|---|---|
| Proposed scheme | - | ||||
| Chen et al. [ | - | ||||
| Xue et al. [ | - | ||||
| Das et al. [ | - | ||||
| Yeh et al. [ | - | ||||
| Fan et al. [ | |||||
| C-S- [ | - | ||||
| Vaidya et al. [ | - | ||||
| K-A- [ | - | ||||
| Das et al. [ | - |
Comparison of the execution times.
| Das’s [ | K-A-’s [ | Vaidya’s [ | C-S-’s [ | Fan’s [ | Yeh’s [ | Das’s [ | Xue’s [ | Chen’s [ | Proposed Scheme |
|---|---|---|---|---|---|---|---|---|---|
| ≈0.0018 s | ≈0.0024 s | ≈0.0026 s | ≈0.002 s | ≈0.0038 s | ≈3.6016 s | ≈0.0542 s | ≈0.0052 s | ≈0.0368 s | ≈0.0374 s |
Comparison of the communication cost between our proposed scheme and other related schemes.
| Schemes | Total Number of Messages Required | Total Number of Bytes Required |
|---|---|---|
| Proposed scheme | 4 Messages | 216 Bytes |
| Chen et al. [ | 4 Messages | 172 Bytes |
| Xue et al. [ | 6 Messages | 284 Bytes |
| Das et al. [ | 4 Messages | 253 Bytes |
| Yeh et al. [ | 3 Messages | 118 Bytes |
| Fan et al. [ | 3 Messages | 126 Bytes |
| Chen and Shih [ | 4 Messages | 170 Bytes |
| Vaidya et al. [ | 5 Messages | 157 Bytes |
| Khan and Alghathbar [ | 4 Messages | 157 Bytes |
| Das et al. [ | 3 Messages | 118 Bytes |