| Literature DB >> 32290358 |
Abstract
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client-server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper two protocols enabling the construction of a mutual authenticated key ensuring anonymity and unlinkability of the client and resisting the most well known attacks. The main difference between the two proposed protocols is in the storage requirements on the server side. The innovation of our protocols relies on the fact that, thanks to the usage of the sponge construction, available in the newly proposed SHA3 standard with underlying Keccak design, the computation cost can be reduced to only one hash operation on the client side in case of the protocol with storage and two hash operations for the protocol without storage and thus leads to a very efficient solution.Entities:
Keywords: Keccak; anonymity; authentication protocol; symmetric key based
Year: 2020 PMID: 32290358 PMCID: PMC7218714 DOI: 10.3390/s20082160
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Message M is broken into n consecutive r bit pieces . The output, after applying the permutation f several rounds, is denoted by . The size of the state on which the function f works, is called the rate r, while the capacity c denotes the size of the part that is untouched by input or output [29].
Figure 2Steps and computations in the proposed authentication and key agreement scheme with storage.
Figure 3Steps and computations in the proposed authentication and key agreement scheme without storage.
Informal security analysis of both protocols.
| Characteristic | Protocol with Storage | Protocol without Storage |
|---|---|---|
| Mutual authentication | Only the entities knowing the secret key | The server is the only entity, who is able to derive |
| Anonymity and unlinkability | The identity | The identity related information sent in the protocol, |
| Perfect forward secrecy of sensor. | If an attacker captures the sensor and gets access to | If the secret information |
| Replay attacks | The value | In addition, here, |
| Desynchronization attack | Suppose the message | Due to the nature of the protocol by the specific construction of the key material, there is no synchronization required. In particular, the usage of the static master key |
| Denial of service attack | The only place where a potential denial of service attack can appear is in the first step of sending the random value | The same reasoning for protection against the denial of service attack also holds in this protocol. |
| Session specific temporary information | In this protocol, there is no additional session specific temporary information that can be revealed in order to be exploited for the generation of the SK. | If also |
Comparison of security strength with related and recent literature with respect to the following features: F1: Mutual authentication, F2: Anonymity and unlinkability, F3: Perfect forward secrecy, F4: Resistance against replay attacks, F5: Resistance against desynchronization attacks, F6: Resistance against denial of service attacks, F7: Resistance against specific temporary information, F8: No need for synchronized clocks (Y: Yes, N: No).
| Scheme (Authors+Year) | F1 | F2 | F3 | F4 | F5 | F6 | F7 | F8 |
|---|---|---|---|---|---|---|---|---|
| Kumar et al., 2017 [ | Y | Y | Y | Y(T) | Y | Y | N | N |
| Chen et al., 2018 [ | Y | Y | Y | Y(T) | Y | Y | N | N |
| Mansoor et al., 2019 [ | Y | Y | Y | N(T,R) | N | N | N | N |
| Lara et al., 2020 [ | Y | Y | Y | Y(T,R) | N | Y | Y | N |
| With storage | Y | Y | Y | Y(T) | Y | Y | Y | Y |
| Without storage | Y | Y | Y | Y(T) | Y | Y | Y | Y |
Comparison of computational cost with related and recent literature. equals the number of hashes and the number of encryption operations.
| Scheme (Authors+Year) | Nr of Operations | With SHA2 ( | With SHA3 ( |
|---|---|---|---|
| Kumar et al., 2017 [ |
| 564 | 1116 |
| Chen et al., 2018 [ |
| 1080 | 2190 |
| Mansoor et al., 2019 [ |
| 540 | 786 |
| Lara et al., 2020 [ |
| 1944 | 3942 |
| With storage |
| - | 438 |
| Without storage |
| - | 876 |
Comparison of communication cost with related and recent literature.
| Scheme (Authors+Year) | Nr of Sent Bits | Nr of Received Bits | Total Sent+Received Bits |
|---|---|---|---|
| Kumar et al., 2017 [ | 704 | 416 | 1120 |
| Chen et al., 2018 [ | 1056 | 1024 | 2080 |
| Mansoor et al., 2019 [ | 672 | 416 | 1088 |
| Lara et al., 2020 [ | 1088 | 1088 | 2176 |
| With storage | 512 | 384 | 896 |
| Without storage | 786 | 640 | 1426 |