| Literature DB >> 27739417 |
Youngseok Chung1,2, Seokjin Choi3, Youngsook Lee4,5, Namje Park6, Dongho Won7.
Abstract
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.Entities:
Keywords: anonymity; authentication; privacy; roaming service; security; wireless sensor network
Year: 2016 PMID: 27739417 PMCID: PMC5087441 DOI: 10.3390/s16101653
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Simplified model of wireless sensor networks for roaming service.
Notations.
| Notation | Description |
|---|---|
|
| Home agent |
|
| Foreign agent |
|
| Mobile node |
|
| Identity of an entity |
|
| Password of |
|
| Pre-shared secret key between |
|
| Secret key of an entity |
|
| Random nonce generated by an entity |
|
| Timestamp generated by an entity |
|
| Symmetric encryption and decryption using a secret key |
|
| Collision free one-way hash function |
|
| Concatenation |
|
| Bit-wise exclusive-OR operation |
Figure 2Login and authentication phase in Farash et al.’s scheme.
Figure 3Password change phase in Farash et al.’s scheme.
Figure 4Registration phase in the proposed scheme.
Figure 5Login and authentication phase in the proposed scheme.
Figure 6Password change phase in the proposed scheme.
Security comparison.
| Scheme | SF1 | SF2 | SF3 | SF4 | SF5 | SF6 | SF7 | SF8 | SF9 |
|---|---|---|---|---|---|---|---|---|---|
| Jiang et al. | Yes | Yes | No | Yes | No | Yes | Yes | Yes | Yes |
| Wen et al. | Yes | Yes | No | Yes | No | Yes | No | No | No |
| Shin et al. | Yes | Yes | No | Yes | No | Yes | Yes | Yes | No |
| Gope and Hwang | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes |
| Farash et al. | Yes | No | No | Yes | No | Yes | Yes | Yes | Yes |
| Ours | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
Performance comparison in login and authentication phase.
| Scheme | MN | FA | HA | Total | |
|---|---|---|---|---|---|
| Jiang et al. | 4H + 1E | 4H | 5H + 1E | 13H + 2E | ≈ 1.0505 s |
| Wen et al. | 4H + 1E | 4H + 1E | 5H + 2E | 13H + 4E | ≈ 2.0945 s |
| Shin et al. | 5H | 1H + 2S | 3H + 2S + 1E | 9H + 4S + 1E | ≈ 0.5613 s |
| Gope and Hwang | 6H + 1E | 3H + 1S | 7H + 1S + 1E | 16H + 2S + 2E | ≈ 1.0694 s |
| Farash et al. | 6H | 1H + 2S | 5H + 2S | 12H + 4S | ≈ 0.0408 s |
| Ours | 6H | 4H | 7H | 17H | ≈ 0.0085 s |
Performance comparison in password change phase.
| Scheme | MN | FA | HA | Total | |
|---|---|---|---|---|---|
| Jiang et al. | 2H | N/A | N/A | 2H | ≈ 0.0010 s |
| Wen et al. | 2H | N/A | N/A | 2H | ≈ 0.0010 s |
| Shin et al. | 4H | N/A | 1H + 1E | 5H + 1E | ≈ 0.5245 s |
| Gope and Hwang | 2H | N/A | N/A | 2H | ≈ 0.0010 s |
| Farash et al. | 6H5 | N/A | 5H | 11H | ≈ 0.0055 s |
| Ours | 6H | N/A | 5H | 11H | ≈ 0.0055 s |
Total computation cost comparison.
| Scheme | P1 | P2 | Total | |
|---|---|---|---|---|
| Jiang et al. | 13H + 2E | 2H | 15H + 2E | ≈ 1.0515 s |
| Wen et al. | 13H + 4E | 2H | 15H + 4E | ≈ 2.0955 s |
| Shin et al. | 9H + 4S + 1E | 5H + 1E | 14H + 4S + 2E | ≈ 1.0858 s |
| Gope and Hwang | 16H + 2S + 2E | 2H | 18H + 2S + 2E | ≈ 1.0704 s |
| Farash et al. | 12H + 4S | 11H | 23H + 4S | ≈ 0.0463 s |
| Ours | 17H | 11H | 28H | ≈ 0.0140 s |