DOI QR코드

DOI QR Code

An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

  • Li, Jiping (School of Computer and Information Science, Hubei Engineering University) ;
  • Ding, Yaoming (School of Computer and Information Science, Hubei Engineering University) ;
  • Xiong, Zenggang (School of Computer and Information Science, Hubei Engineering University) ;
  • Liu, Shouyin (College of Physical Science and Technology, Central China Normal University)
  • Received : 2017.04.30
  • Accepted : 2017.07.18
  • Published : 2017.11.30

Abstract

As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker's own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.

Keywords

References

  1. L. Atzori, A. Iera and G. Morabito, "The internet of Things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, June, 2010. https://doi.org/10.1016/j.comnet.2010.05.010
  2. H. Ning, H. Liu and L T. Yang, "Aggregated-proof based hierarchical authentication scheme for the Internet of Things," IEEE trans. on parallel and distribution systems, vol. 26, no. 3, pp. 657-667, March, 2015. https://doi.org/10.1109/TPDS.2014.2311791
  3. Yoon, E. J., Yoo, K. Y., " Cryptanalysis of robust mutual authentication protocol for wireless sensor networks," in Proc. of the 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing, pp. 392-396, August 18-20, 2011.
  4. Yick, J., Mukherjee, B., Ghosal, D., "Wireless sensor network survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, August, 2008. https://doi.org/10.1016/j.comnet.2008.04.002
  5. Wong K. H. M., Zheng, Y., Cao, J., Wang S., "A dynamic user authentication scheme for wireless sensor networks, " In Proc.of the IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, pp. 244-251, June 5-7, 2006.
  6. Tseng H. R., Jan R. H., Yang W, "An improved dynamic user authentication scheme for wireless sensor networks," In Proc. of the Global Telecommunications Conference, pp. 986-990, November 26-30, 2007.
  7. Das, M. L., "Two-factor user authentication in wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp.1086-1090, March, 2009. https://doi.org/10.1109/TWC.2008.080128
  8. Xu J., Zhu W. T., Feng D. G., "An improved smart card based password authentication scheme with provable security," Computer Standards Interfaces, vol. 31, no. 4, pp. 723-728, June, 2009. https://doi.org/10.1016/j.csi.2008.09.006
  9. Nyang D. H., Lee M. K., "Improvement of Das's two-factor authentication protocol in wireless sensor networks," IACR Cryptology ePrint Archive, vol. 2009, pp. 1-5, 2009.
  10. Khan, M. K., Alghathbar, K., "Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks," Sensors, vol. 10, no. 3, pp.2450-2459, March, 2010. https://doi.org/10.3390/s100302450
  11. Chen T. H., Shih W. K., "A robust mutual authentication protocol for wireless sensor networks," Electronic Telecommunication Research Institute, vol. 32, no. 5, pp.704-712, October, 2010.
  12. He D, Gao Y., Chan S., Chen C., Bu J., "An enhanced two-factor user authentication scheme in wireless sensor networks, "Ad Hoc Sensor Wireless Networks, vol. 10, no. 4, pp. 361-371, January, 2010.
  13. Vaidya B., Makrakis D., Mouftah H., "Two-factor mutual authentication with key agreement in wireless sensor networks," Security and Communication Networks, vol. 9, no. 2, pp. 171-183, April, 2012.
  14. Das A. K., Sharma P., Chatterjee S., Sing J. K., "A dynamic password-based user authentication scheme for hierarchical wireless networks," Journal of Network and Computer Applications, vol. 35, no. 5, pp.1646-1656, September, 2012. https://doi.org/10.1016/j.jnca.2012.03.011
  15. Li C. T., Weng C. Y., Lee C. C., "An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks," Sensors, vol. 13, no. 8, pp.9589-9603, July, 2013. https://doi.org/10.3390/s130809589
  16. Yoo, S. G., Lee H., Kim J., "A performance and usability aware secure two-factor user authentication schemes for wireless sensor networks, "International Journal of Distributed Sensor Networks, vol. 2013, no. 2, pp. 543950, January, 2013.
  17. Kim J., Lee D., Jeon W., Lee Y. and Won D., "Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks," Sensors, vol. 14, no. 4, pp.6443-6462, April, 2014. https://doi.org/10.3390/s140406443
  18. I-Pin Chang, Tian-Fu Lee, Tsung-Hung Lin and Chuan-Ming Liu, "Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks," Sensors, vol. 15, no. 12, pp.29841-29854, November, 2015. https://doi.org/10.3390/s151229767
  19. Turkanovic M., Holbl M., "An improved dynamic password-based user-authentication scheme for hierarchical wireless sensor networks," Elektronika Ir Elektrotechnika, vol. 19, no. 6, pp. 109-116, June, 2013.
  20. Xue K., Ma C., Hong P., Ding R., "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, "Journal of Network and Computer Applications, vol. 36, no. 1, pp. 316-323, January, 2013. https://doi.org/10.1016/j.jnca.2012.05.010
  21. Li Jiping, Ding Yaoming, Xiong Zenggang and Liu Shouyin, "An Improved Biometric-based User Authentication Scheme for C/S system," International Journal of Distributed Sensor Networks, vol. 2014, no. 2, pp. 275341, January, 2014.
  22. Debiao He, Neeraj Kumar, Naveen Chilamkurti, "A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks," Information Science, vol. 321, no. 10, pp. 263-277, November, 2015. https://doi.org/10.1016/j.ins.2015.02.010
  23. Debiao He, Sherali Zeadally, "Authentication protocol for ambient assisted living system," IEEE Communications Magazine, vol. 53, no. 1, pp.71-77, January, 2015. https://doi.org/10.1109/MCOM.2015.7010518
  24. Honglong Chen and Wei Lou, "On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks," Pervasive and Mobile Computing, vol. 16, Part A, pp. 36-50, January, 2015. https://doi.org/10.1016/j.pmcj.2014.01.006
  25. Honglong Chen, Guoliang Xue and Zhibo Wang, "Efficient and reliable missing tag identificaiton for large-scale RFID systems with unknown tags," IEEE internet of things Journal, vol. 4, no. 3, pp. 736-748, February, 2017. https://doi.org/10.1109/JIOT.2017.2664810
  26. Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang and Qian Wang, "Achieving location error tolerant barrier coverage for wireless sensor networks," Computer Networks, vol. 112, no. 15, pp. 314-328, January, 2017. https://doi.org/10.1016/j.comnet.2016.11.014
  27. Zhibo Wang, Qing Cao, Hairong Qi, Honglong Chen and Qian Wang, "Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks," Ad Hoc Networks, vol. 64, pp. 65-79, September, 2017. https://doi.org/10.1016/j.adhoc.2017.06.004

Cited by

  1. A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications vol.2021, pp.None, 2021, https://doi.org/10.1155/2021/8871204