| Literature DB >> 29160861 |
Ling Xiong1, Daiyuan Peng2, Tu Peng3, Hongbin Liang4, Zhicai Liu5.
Abstract
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.Entities:
Keywords: mutual authentication; strand space model; user anonymity; wireless sensor networks
Year: 2017 PMID: 29160861 PMCID: PMC5712854 DOI: 10.3390/s17112681
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Real-time data access in WSNs.
Notations.
| Notation | Descriptions |
|---|---|
| The user | |
| The sensor node | |
| GWN | The gateway node |
| The smart card | |
| Unique identity and password of | |
| Unique identity of | |
| Unique identity of GWN | |
| Pseudonym identity | |
| Pseudonym identity of | |
| A random number of | |
| The secret key of GWN | |
| The shared secret key between GWN and | |
| The shared secret key between GWN and | |
| A random number generate by | |
| The session key | |
| Encryption/Decryption using the symmetric key | |
| One-way hash function | |
| One-way hash function, | |
| Current timestamp | |
| String concatenation operation | |
| ⊕ | XOR operation |
Figure 2The authentication and key agreement phase of Lu et al.’s scheme.
Figure 3The authentication and key agreement phase of Jung et al.’s scheme.
Figure 4The registration phase. (a) The user registration phase; (b) The sensor node registration phase.
Figure 5The authentication and key agreement phase.
Figure 7The de-synchronization on our proposed scheme.
Security features comparisons of our scheme and the two related schemes.
| Features | Lu et al. [ | Jung et al. [ | Ours |
|---|---|---|---|
| Resistance to de-synchronization attack | √ | √ | √ |
| Mutual authentication | √ | √ | √ |
| User anonymity | √ | √ | √ |
| Perfect forward security | × | × | √ |
| Smart card loss attack | × | × | √ |
| Resistance to known session-specific temporary information attack | √ | √ | √ |
| Resistance to stolen verifier table attack | √ | √ | √ |
| Resistance to user impersonation attack | √ | √ | √ |
| Resistance to sensor node spoofing attack | √ | √ | √ |
| Resistance to replay attack | √ | √ | √ |
| Resistance to man-in-the-middle attack | √ | √ | √ |
| Resistance to wrong password login/update attack | √ | √ | √ |
Computation complexity comparisons of our scheme and the two related schemes.
| Schemes | Users | GWN | Sensor Node | Total |
|---|---|---|---|---|
| Lu et al. [ | 7 | 8 | 4 | 19 |
| Jung et al. [ | 5 | 5 | 4 | 13 |
| Ours | 9 | 11 | 4 | 25 |
Communication cost comparisons of our scheme and the two related schemes.
| Schemes | Number of Message Required | Number of Bits Required |
|---|---|---|
| Lu et al. [ | 4 Messages | 3840 |
| Jung et al. [ | 4 Messages | 2624 |
| Ours | 5 Messages | 2208 |