| Literature DB >> 27983616 |
Abstract
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.Entities:
Keywords: biometric information; elliptic curve cryptosystem; key agreement; user authentication; wireless sensor networks
Year: 2016 PMID: 27983616 PMCID: PMC5191103 DOI: 10.3390/s16122123
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Notations.
| Notation | Meaning |
|---|---|
| two large primes | |
| user | |
| sensor node | |
| gateway node | |
| smart card of the user | |
| identity/password of | |
| biometric template of | |
| temporal identity of | |
| identity of | |
| identity of | |
| adversary | |
| a master secret of | |
| cyclic group of order | |
| generator of | |
| timestamps | |
| ⨁ | XOR operation |
| concatenate operation | |
| a secure one-way hash function |
Figure 1Registration phase.
Figure 2Login phase.
Figure 3Authentication and key agreement phase.
Figure 4Password change phase.
BAN logic notations.
| Notations | Meaning |
|---|---|
| The session key shared between two principals | |
Comparisons of the functionality features. ECC, elliptic curve cryptosystem.
| Kim et al.’ Scheme [ | Chang et al.’ Scheme [ | Yoon and Yoo’s Scheme [ | Choi et al.’ Scheme [ | Proposed Scheme | |
|---|---|---|---|---|---|
| Provides user anonymity | × | ∘ | × | × | ∘ |
| Provides user untraceability | × | Δ | × | × | ∘ |
| Provides forward secrecy | × | × | ∘ | ∘ | ∘ |
| Provides secure password update | ∘ | × | − | − | ∘ |
| Provides mutual authentication | ∘ | ∘ | ∘ | ∘ | ∘ |
| Resists off-line password guessing attack | × | × | − | − | ∘ |
| Resists user impersonation attack | × | Δ | ∘ | × | ∘ |
| Resists lost smart card attack | × | Δ | ∘ | ∘ | ∘ |
| Resists stolen verifier attack | × | Δ | − | − | ∘ |
| Resists man-in-the-middle attack | × | Δ | ∘ | ∘ | ∘ |
| Resists replay attack | ∘ | ∘ | ∘ | ∘ | ∘ |
| Resist biometric recognition error | − | − | × | ∘ | ∘ |
| Usage of biometrics | × | × | ∘ | ∘ | ∘ |
| Usage of ECC | × | × | ∘ | ∘ | ∘ |
Comparisons of the computation costs.
| Scheme | Computation Cost | |||
|---|---|---|---|---|
| Registration | Login & Authentication | Total | ||
| Kim et al.’s [ | User | |||
| Sensor | 0 | |||
| Chang et al.’s [ | User | |||
| Sensor | 0 | |||
| Yoon and Yoo’s [ | User | |||
| Sensor | 0 | |||
| Choi et al.’s [ | User | |||
| Sensor | 0 | |||
| Proposed | User | |||
| Sensor | 0 | |||