| Literature DB >> 28335572 |
Jaewook Jung1, Jongho Moon2, Donghoon Lee3, Dongho Won4.
Abstract
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.Entities:
Keywords: formal proof; lightweight computation; off-line password guessing attack; session key agreement; wireless sensor networks
Year: 2017 PMID: 28335572 PMCID: PMC5375930 DOI: 10.3390/s17030644
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1WSN system architecture.
Notations.
| Value | Description |
|---|---|
| Remote user | |
| Sensor node | |
| Gateway node | |
| Identity and password of | |
| Biometric information of | |
| New password of | |
| Random number of | |
| Identity of smart card | |
| Temporary identity for | |
| Identity of | |
| Secret key generated by the | |
| Random numbers | |
| One-way hash function | |
| Biohash function | |
| Pseudo-random function of variable | |
| Concatenate operation | |
| ⊕ | XOR operation |
| Current time stamp values | |
| Session key | |
| The maximum of the transmission delay time |
Figure 2Authentication mechanism using the biohashing approach.
Figure 3Registration phase for the proposed scheme.
Figure 4Login and authentication phase for the proposed scheme.
Figure 5Password change phase for the proposed scheme.
Security comparison of our proposed scheme and other related schemes.
| Features | Khan et al. [ | Vaidya et al. [ | Kim et al. [ | Chang et al. [ | Park et al. [ | Our Scheme |
|---|---|---|---|---|---|---|
| User anonymity | × | × | √ | √ | √ | √ |
| Mutual authentication | × | √ | √ | √ | √ | √ |
| Stolen smart card attack | × | × | × | × | √ | √ |
| Replay attack | √ | √ | √ | √ | √ | √ |
| Off-line PW guessing attack | × | √ | √ | × | √ | √ |
| × | × | √ | × | √ | √ | |
| × | √ | × | √ | √ | √ | |
| Password verification | √ | √ | √ | √ | √ | √ |
| Session key verification | × | × | × | × | × | √ |
| Privileged-insider attack | √ | √ | √ | √ | √ | √ |
| Session key security | × | × | × | × | √ | √ |
| Efficient password change | √ | √ | √ | √ | √ | √ |
| × | × | √ | √ | √ | √ | |
| Off-line ID guessing attack | × | × | √ | √ | √ | √ |
| No verifier table | √ | √ | √ | × | × | √ |
| Formal proof | × | √ | × | √ | √ | √ |
Comparison of the computational cost between our scheme and other hash-based schemes.
| Phases | Khan et al. [ | Vaidya et al. [ | Kim et al. [ | Chang et al. [ | Park et al. [ | Proposed Scheme | |
|---|---|---|---|---|---|---|---|
| Registration | |||||||
| − | − | − | − | − | − | ||
| Login | |||||||
| − | − | − | − | − | − | ||
| − | − | − | − | − | − | ||
| Authen tication | − | ||||||
| Password change | |||||||
| − | − | − | − | − | − | ||
| − | − | − | − | − | − | ||
| Total cost | |||||||
| Execution time | ≈0.008 s | ≈0.015 s | ≈0.0185 s | ≈0.0185 s | ≈0.4605 s | ≈0.017 s | |