| Literature DB >> 32722503 |
Abstract
Wireless sensor networks (WSN) are composed of multiple sensor nodes with limited storage, computation, power, and communication capabilities and are widely used in various fields such as banks, hospitals, institutes to national defense, research, and so on. However, useful services are susceptible to security threats because sensitive data in various fields are exchanged via a public channel. Thus, secure authentication protocols are indispensable to provide various services in WSN. In 2019, Mo and Chen presented a lightweight secure user authentication scheme in WSN. We discover that Mo and Chen's scheme suffers from various security flaws, such as session key exposure and masquerade attacks, and does not provide anonymity, untraceability, and mutual authentication. To resolve the security weaknesses of Mo and Chen's scheme, we propose a secure and lightweight three-factor-based user authentication protocol for WSN, called SLUA-WSN. The proposed SLUA-WSN can prevent security threats and ensure anonymity, untraceability, and mutual authentication. We analyze the security of SLUA-WSN through the informal and formal analysis, including Burrows-Abadi-Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. Moreover, we compare the performance of SLUA-WSN with some existing schemes. The proposed SLUA-WSN better ensures the security and efficiency than previous proposed scheme and is suitable for practical WSN applications.Entities:
Keywords: AVISPA simulation; BAN logic; ROR model; authentication; wireless sensor networks
Year: 2020 PMID: 32722503 PMCID: PMC7436245 DOI: 10.3390/s20154143
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Authentication model in wireless sensor network.
Figure 2Registration process of Mo and Chen’s scheme.
Figure 3Authentication process of Mo and Chen’s scheme.
Notations.
| Notation | Description |
|---|---|
|
| User |
|
| Gateway node |
|
| Sensor node |
|
| |
|
| |
|
| |
|
| Master key of |
|
| Public key of |
|
| Secret key of |
|
| Elliptic curve |
|
| A group for an elliptic curve |
|
| The generator of |
|
| Symmetric key encryption/decryption |
|
| Session key |
|
| Timestamp |
|
| Biometric of |
|
| Hash function |
| ⊕ | XOR operation |
|
| Concatenation operation |
Figure 4Pre-deployment process of the proposed scheme.
Figure 5User registration process of our scheme.
Figure 6Authentication process of our scheme.
Security property comparison.
| Security Properties | Wu et al. [ | Wang et al. [ | Li et al. [ | Li et al. [ | Lu et al. [ | Mo and Chen [ | Ours |
|---|---|---|---|---|---|---|---|
| Three-factor security | × | ∘ | × | ∘ | × | ∘ | ∘ |
| Masquerade attack | × | ∘ | × | × | × | × | ∘ |
| Replay attack | × | ∘ | × | × | ∘ | ∘ | ∘ |
| Privileged insider attack | ∘ | × | ∘ | × | ∘ | ∘ | ∘ |
| Sensor node capture attack | ∘ | ∘ | ∘ | ∘ | ∘ | ∘ | ∘ |
| Man-in-the-middle attack | ∘ | ∘ | × | × | ∘ | ∘ | ∘ |
| User anonymity | ∘ | ∘ | ∘ | ∘ | ∘ | × | ∘ |
| Untraceability | ∘ | ∘ | ∘ | ∘ | ∘ | × | ∘ |
| Mutual authentication | ∘ | ∘ | ∘ | ∘ | ∘ | × | ∘ |
∘: it supports security properties; ×: it does not support security properties.
Notations used for BAN logic.
| Notation | Description |
|---|---|
|
|
|
|
| |
|
|
|
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
Queries of the Real-or-Random (ROR) model.
| Query | Description |
|---|---|
|
| |
|
| |
|
| Using this query, the |
|
| |
|
| Using this query, the |
Figure 7High-Level Protocols Specification Language (HLPSL) syntax for session and environment.
Figure 8HLPSL syntax for .
Figure 9HLPSL syntax for .
Figure 10HLPSL syntax for .
Figure 11AVISPA simulation results using On-the-Fly Model Checker (OFMC) and Constraint-Logic-based ATtack SEarcher (CL-AtSe).
Computation overheads comparison.
| Schemes | User | Gateway | Sensor node | Total | Computation overhead |
|---|---|---|---|---|---|
| Wu et al. [ |
|
|
|
| 36.77 ms |
| Wang et al. [ |
|
|
|
| 51.48 ms |
| Li et al. [ |
|
|
|
| 29.42 ms |
| Li et al. [ |
|
|
|
| 44.13 ms |
| Lu et al. [ |
|
|
|
| 51.99 ms |
| Mo and Chen [ |
|
|
|
| 37.03 ms |
| Ours |
|
|
|
| 7.36 ms |
Communication overheads comparison.
| Schemes | Communication Overhead | Number of Messages |
|---|---|---|
| Wu et al. [ | 3072 bits | 4 messages |
| Wang et al. [ | 2368 bits | 4 messages |
| Li et al. [ | 2496 bits | 4 messages |
| Li et al. [ | 2880 bits | 4 messages |
| Lu et al. [ | 2880 bits | 3 messages |
| Mo and Chen [ | 3328 bits | 4 messages |
| Ours | 2208 bits | 4 messages |
Storage overheads comparison.
| Schemes | Stored Message (Smart Card/mobile Device) | Stored Message (Gateway Node) |
|---|---|---|
| Wu et al. [ | ||
| Wang et al. [ | ||
| Li et al. [ | ||
| Li et al. [ | ||
| Lu et al. [ | ||
| Mo and Chen [ | ||
| Ours |