| Literature DB >> 29257066 |
Chenyu Wang1, Guoai Xu2, Jing Sun3.
Abstract
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.Entities:
Keywords: offline dictionary attack; smart card; user authentication
Year: 2017 PMID: 29257066 PMCID: PMC5750781 DOI: 10.3390/s17122946
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1WSNs system architecture.
Notations and abbreviations.
| Symbol | Description |
|---|---|
| the gateway node | |
| malicious attacker | |
| identity of user | |
| password of user | |
| biometrics of user | |
| the shared secret key between | |
| the secret key of remote server | |
| ⊕ | the bitwise exclusive OR (XOR) operation |
| ∥ | the string concatenation operation |
| collision free one-way hash function to the biometrics | |
| collision free one-way hash function | |
| one part of fuzzy extraction function, output a biometric key | |
| one part of fuzzy extraction function, output the biometric key | |
| a insecure channel | |
| a secure channel |
Figure 2Proposed scheme.
Notations in BAN logic.
| This rule will be used in the proving process. | |
| This rule will be used in the proving process. | |
| This rule will be used in the proving process. | |
| This rule will be used in the proving process. |
Performance comparison among relevant schemes in wireless sensor networks.
| Computation Overhead | Communication Cost | The Proposed Evaluation Criteria | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Login (ms) | Auth. (ms) | Login | Auth. | S1 | S2 | S3 | S4 | S5 | S6 | S7 | S8 | S9 | S10 | S11 | S12 | S13 | |||
| Amin et al. [ | 768 bits | 1536 bits | √ | × | √ | × | √ | √ | √ | × | √ | √ | √ | √ | √ | ||||
| Jiang et al. [ | 1408 bits | 1280 bits | √ | × | √ | × | √ | √ | √ | × | √ | √ | √ | √ | √ | ||||
| Jung et al. [ | 512 bits | 1024 bits | √ | × | √ | × | × | √ | √ | × | √ | √ | √ | × | √ | ||||
| Park et al. [ | 1536 bits | 4096bits | √ | × | √ | √ | × | × | √ | × | √ | √ | √ | √ | √ | ||||
| Our scheme | 1408 bits | 3968 bits | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | ||||
is the time of modular exponentiation operation, is the time of scalar multiplication on elliptic curve, is the time of hash computation, (according to Wang et al. [28], ms, ms, s) and the lightweight operation such as “XOR” and “” can be ignored. Let be 32-bit long; Let , , , output of symmetric encryption, timestamp, random numbers be 128-bit long; Let p, g, y be 1024-bit long. √ means the property is satisfied; × means the property is not satisfied.