| Literature DB >> 28441331 |
Jongho Moon1, Donghoon Lee2, Youngsook Lee3, Dongho Won4.
Abstract
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.Entities:
Keywords: biometric; smart card; user authentication; wireless sensor networks
Year: 2017 PMID: 28441331 PMCID: PMC5461064 DOI: 10.3390/s17050940
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Notations used in this paper.
| Term | Description |
|---|---|
| user | |
| adversary | |
| biometric template of | |
| encryption or decryption with key | |
| gateway node | |
| cyclic groups of order | |
| hash function | |
| long-term secret of | |
| actual identity of | |
|
| generator of |
| random number generated by | |
| random number generated by | |
| sensor node | |
| smart card of user | |
| identity of | |
| time stamp | |
| two master keys of | |
| Response to the query message | |
| ‖ | concatenation operation |
| ⊕ | bitwise XOR operation |
Figure 1Registration phase of the proposed scheme.
Figure 2Login and authentication phase of the proposed scheme.
Figure 3Revocation/reissue phase of proposed scheme.
Comparison of security features.
| Features | Yoon and Kim | Choi et al. | Park et al. | The Proposed |
|---|---|---|---|---|
| [ | [ | [ | ||
| Provides user anonymity | N/A | × | ◯ | ◯ |
| Provides mutual authentication | ◯ | ◯ | ◯ | ◯ |
| Provides message confidentiality | ◯ | ◯ | ◯ | ◯ |
| Provides perfect forward secrecy | N/A | ◯ | ◯ | ◯ |
| Resists insider attack | ◯ | × | ◯ | ◯ |
| Resists impersonation attack | ◯ | × | × | ◯ |
| Resists illegal smart card revocation/reissue attack | × | × | × | ◯ |
| Resists biometric recognition error | × | ◯ | ◯ | ◯ |
| Resists session key exposure by gateway | × | ◯ | ◯ | ◯ |
| Resists denial of service attack | × | ◯ | ◯ | ◯ |
| Resists user verification problem | × | ◯ | ◯ | ◯ |
| Resists stolen verifier attack | ◯ | ◯ | ◯ | ◯ |
| Resists replay attack | ◯ | ◯ | ◯ | ◯ |
| Security factor | Two-factor | Two-factor | Two-factor | Two-factor |
◯: scheme provides the property; ×: scheme does not provide the property; N/A: scheme does not consider the property.
Comparison of computational costs.
| Phases | Choi et al. | Park et al. | Nam et al. | Park et al. | The Proposed | |
|---|---|---|---|---|---|---|
| [ | [ | [ | [ | |||
| Registration | ||||||
| 3 | 2 | 5 | ||||
| - | - | - | - | - | ||
| Login and authentication | 3 | 10 | ||||
| 10 | 7 | 11 | 6 | |||
| 6 | 4 | 4 | 4 | |||
| Revocation and reissue | - | - | ||||
| 3 | 2 | - | - | 5 | ||
| - | - | - | - | - | ||
| Total cost | 34 | 23 | 7 | 31 | 26 | |
| + 4 | + 5 | + 7 | + 4 | + 2 | ||
: computational time for elliptic curve computation; : computational time for encryption/decryption; : computational time for fuzzy extraction; : computational time for hash function; : computational time for massage authentication code.