Online citations, reference lists, and bibliographies.
← Back to Search

Provably Secure User Authentication And Key Agreement Scheme For Wireless Sensor Networks

A. K. Das, S. Kumari, Vanga Odelu, X. Li, F. Wu, Xinyi Huang
Published 2016 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
In recent years, user authentication has emerged as an interesting field of research in wireless sensor networks. Most recently, in 2016, Chang and Le presented a scheme to authenticate the users in wireless sensor network using a password and smart card. They proposed two protocols P1 and P2. P1 is based on exclusive or XOR and hash functions, while P2 deploys elliptic curve cryptography in addition to the two functions used in P1. Although their protocols are efficient, we point out that both P1 and P2 are vulnerable to session specific temporary information attack and offline password guessing attack, while P1 is also vulnerable to session key breach attack. In addition, we show that both the protocols P1 and P2 are inefficient in authentication and password change phases. To withstand these weaknesses found in their protocols, we aim to design a new authentication and key agreement scheme using elliptic curve cryptography. Rigorous formal security proofs using the broadly accepted, the random oracle models, and the Burrows-Abadi-Needham logic and verification using the well-known Automated Validation of Internet Security Protocols and Applications tool are preformed on our scheme. The analysis shows that our designed scheme has the ability to resist a number of known attacks comprising those found in both Chang-Le's protocols. Copyright © 2016 John Wiley & Sons, Ltd.
This paper references
10.1007/s11227-015-1610-x
A privacy preserving three-factor authentication protocol for e-Health clouds
Qi Jiang (2015)
10.1109/TWC.2015.2473165
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
10.1109/TDSC.2014.2355850
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang (2015)
Fuzzy extractors : How to generate strong keys from biometrics and other noisy data
Suela Kodra (2015)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1007/978-3-319-29485-8_15
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
P. Pessl (2016)
A privacy preserving three-factor authentication protocol for ehealth clouds. The Journal of Supercomputing 2016, DOI: 10.1007/s11227-015-1610-x
Q Jiang (2016)
10.3929/ETHZ-A-006744596
OFMC: A Symbolic Model-Checker for Security Protocols
D. Basin (2004)
10.1109/TIFS.2014.2375555
Effective Key Management in Dynamic Wireless Sensor Networks
Seung-Hyun Seo (2015)
10.5755/J01.EEE.19.6.2038
An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
Muhamed Turkanovic (2013)
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1109/TCE.2016.7448560
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms
Vanga Odelu (2016)
10.1007/s11277-013-1594-x
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks
Qi Jiang (2014)
10.1002/sec.1464
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
Http:// www.avispa-project.org/web-interface/expert. php/.[Accessed on September 2015
A. K. Das (2015)
10.1002/dac.2933
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
A. K. Das (2017)
10.1109/TIFS.2015.2439964
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
Vanga Odelu (2015)
Cryptography and Network Security: Principles and Practice
W. Stallings (1998)
An advanced temporal credentialbased security scheme with mutual authentication and key agreement for wireless sensor networks
CT Li (2013)
10.1145/77648.77649
A logic of authentication
M. Burrows (1990)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1049/iet-ifs.2010.0125
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
A. K. Das (2011)
10.1007/s11432-015-5469-5
One-to-many authentication for access control in mobile pay-TV systems
D. He (2015)
10.1007/3-540-48405-1_25
Differential Power Analysis
Paul C. Kocher (1999)
Cryptography and network security - principles and practice (3. ed.)
W. Stallings (1999)
10.1007/11513988_27
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
A. Armando (2005)
A secure and robust temporal credentialbased threefactor user authentication scheme for wireless sensor networks
AK Das (2016)
10.1007/s12083-014-0324-9
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
A. K. Das (2016)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1109/TVT.2008.2008191
An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network
H. T. Nguyen (2009)
10.1007/3-540-44987-6_28
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
R. Canetti (2001)
10.1109/TCE.2014.6780922
Enhanced three-factor security protocol for consumer USB mass storage devices
D. He (2014)
10.1145/328236.328110
Biometric identification
Anil K. Jain (2000)
10.1504/IJCNDS.2015.070286
An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks
A. K. Das (2015)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1016/j.adhoc.2014.11.018
User authentication schemes for wireless sensor networks: A review
S. Kumari (2015)
10.1007/S11071-015-2467-5
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Qi Jiang (2016)
10.1109/JSYST.2016.2544805
Anonymous Authentication for Wireless Body Area Networks With Provable Security
D. He (2017)
10.1016/j.adhoc.2015.05.014
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
10.1016/j.adhoc.2014.03.009
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
10.1016/j.jnca.2009.08.001
An efficient biometrics-based remote user authentication scheme using smart cards
C. Li (2010)
10.1007/s11277-015-2288-3
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
A. K. Das (2015)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1007/s11432-015-5509-1
Impact of RF mismatches on the performance of massive MIMO systems with ZF precoding
H. Wei (2015)
10.1049/IP-IFS:20055073
Password-Based Authenticated Key Exchange in the Three-Party Setting
M. Abdalla (2004)
10.1002/sec.337
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
N. T. Huyen (2012)
An efficient multigateway based threefactor user authentication and key agreement scheme in hierarchical wireless sensor networks
AK Das (2016)
10.1007/s12083-014-0285-z
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)



This paper is referenced by
10.1109/TDSC.2017.2764083
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
M. Wazid (2020)
10.1109/ISCISC48546.2019.8985159
IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes
Mehranpoor. Shayan (2019)
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT
Seyed Farhad Aghili (2020)
10.1016/j.sysarc.2020.101877
Blockchain-based batch authentication protocol for Internet of Vehicles
Palak Bagga (2020)
Cryptographic Solutions for Cyber-Physical System Security
Chenglu Jin (2019)
10.1109/ACCESS.2019.2931217
A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
Favian Dewanta (2019)
10.1109/TII.2019.2963328
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang (2020)
10.1002/DAC.3514
On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC
Anil Kumar Sutrala (2018)
10.2196/16407
Barriers and Facilitators That Influence Telemedicine-Based, Real-Time, Online Consultation at Patients’ Homes: Systematic Literature Review
Hassan Khader Y Almathami (2020)
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
10.1145/3303704
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs
Z. Yang (2019)
10.1109/ACCESS.2018.2880225
An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN
M. Alotaibi (2018)
10.1016/J.FUTURE.2018.04.019
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems
S. Challa (2020)
10.1016/j.cmpb.2019.105054
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system
P. Soni (2019)
10.1007/978-981-10-4642-1_3
Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities"
M. Karuppiah (2017)
Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings
Adhirath Kabra (2020)
10.1177/1550147718756311
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
J. He (2018)
10.1007/S11276-017-1588-9
PSP: proximity-based secure pairing of mobile devices using WiFi signals
Weirong Cui (2019)
10.1109/JIOT.2017.2780232
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
10.1007/S11036-018-1061-8
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
M. Karuppiah (2019)
10.1109/ICACCCN.2018.8748508
An Efficient Biometric based three-factor authentication scheme for Wireless Sensor Network
D. Singh (2018)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1155/2018/3048697
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment
Chenyu Wang (2018)
10.1007/s11227-016-1948-8
Attribute-based authentication on the cloud for thin clients
M. Ibrahim (2016)
10.1007/S12652-020-02349-5
ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment
B. Alzahrani (2020)
10.1049/iet-sen.2020.0006
Taxonomy of secure data dissemination techniques for IoT environment
Umesh Bodkhe (2020)
10.1007/S12652-020-02532-8
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
Devender Kumar (2020)
10.1016/j.is.2019.101423
Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks
I. Santos-González (2020)
10.1016/j.jisa.2020.102494
A three-factor anonymous user authentication scheme for Internet of Things environments
Hakjun Lee (2020)
10.1109/ACCESS.2020.3000790
On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks
Joonyoung Lee (2020)
10.1109/JBHI.2017.2753464
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
A. K. Das (2018)
10.1109/TIFS.2017.2668062
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
Kyung-Ah Shim (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar