Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

Cryptanalysis And Improvement Of An Authentication Protocol For Wireless Sensor Networks Applications Like Safety Monitoring In Coal Mines

Devender Kumar, Satish Chand, B. Kumar
Published 2019 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy
Share
The wireless sensor networks have several applications in different areas like medical, military, industry, safety, etc. Recently, Kumari and Om have discussed an authentication protocol for wireless sensor networks in coal mines for safety monitoring. In this paper, we cryptanalyze their scheme and find that it is vulnerable to the smart card loss attack, stolen verifier attack, and denial of service attack, besides other problems: (1) user traceability and (2) the sensor nodes are not anonymous. Here, we purpose an improved scheme by overcoming these limitations. We formally show the security analysis of our proposed scheme using random oracle and its security verification using the AVISPA tool. We carry out its informal analysis to show its resistivity to various known attacks. It requires less computational and storage costs, and is more secured than the related schemes. We also show its practical demonstration using NS2 simulator.
This paper references
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.1007/s00530-013-0346-9
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D. He (2013)
10.1145/1031495.1031518
Simulating the power consumption of large-scale sensor network applications
V. Shnayder (2004)
10.1016/j.comnet.2016.05.007
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
S. Kumari (2016)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1109/TIE.2016.2585081
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope (2016)
10.1002/dac.2933
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
A. K. Das (2017)
10.5296/npa.v3i1.580
Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey
G. Zhao (2011)
10.1109/SURV.2013.091513.00050
A Survey of SIP Authentication and Key Agreement Schemes
H. H. Kilinc (2014)
10.1109/ISWCS.2008.4726128
A novel dynamic user authentication scheme for wireless sensor networks
Lee-Chun Ko (2008)
10.1109/MCSA.2003.1240764
Rapid prototyping of mobile input devices using wireless sensor nodes
J. Carlson (2003)
10.1016/j.jnca.2008.02.017
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
Bai Li (2009)
10.3745/JIPS.2011.7.1.017
A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network
Jiehui Chen (2011)
10.1504/IJITCC.2011.039281
Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks
D. Kumar (2011)
10.1007/S13320-014-0160-9
Fiber Bragg grating (FBG) sensors used in coal mines
Jinyu Wang (2014)
10.1016/j.compeleceng.2017.03.016
Efficient end-to-end authentication protocol for wearable health monitoring systems
Qi Jiang (2017)
10.1016/j.comcom.2017.05.009
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC
Preeti Chandrakar (2017)
10.1109/GLOCOM.2007.190
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
Huei-Ru Tseng (2007)
10.1002/sec.1214
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
X. Li (2016)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1002/sec.1464
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
10.1002/DAC.V23:9/10
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
B. Vaidya (2010)
10.3390/s140610081
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
10.1109/IIHMSP.2010.14
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang (2010)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1007/3-540-48405-1_25
Differential Power Analysis
Paul C. Kocher (1999)
10.1109/TDSC.2016.2605087
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
Ding Wang (2018)
10.1504/IJITCC.2011.042127
Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks
G. Zhao (2011)
10.1007/s12594-012-0071-6
Structural controls on coal fire distributions — Remote sensing based investigation in the Raniganj coalfield, West Bengal
A. Guha (2012)
10.1109/JSEN.2016.2628413
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
Prosanta Gope (2017)
10.3390/s120201625
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
P. Kumar (2012)
10.1109/ACCESS.2017.2673239
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Q. Jiang (2017)
10.1016/j.jnca.2010.03.004
A novel node level security policy framework for wireless sensor networks
W. Claycomb (2011)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.3390/s101109891
A Wireless Sensor Network Based Personnel Positioning Scheme in Coal Mines with Blind Areas
Z. Liu (2010)
10.1016/j.ins.2015.02.010
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)



This paper is referenced by
10.1016/J.JISA.2019.03.008
A secure authentication protocol for wearable devices environment using ECC
Devender Kumar (2019)
10.1007/978-981-15-1465-4_34
Cryptanalysis of Kumar et al.’s Authentication Protocol for Wireless Sensor Networks
Sewan Ha (2020)
10.4018/978-1-7998-5068-7.ch011
Analysis of Black-Hole Attack With Its Mitigation Techniques in Ad-hoc Network
A. Malik (2020)
10.1002/dac.4508
Robust three-factor authentication protocol for satellite communication systems
Yulei Chen (2020)
10.4018/978-1-7998-3473-1.CH045
Information Technology in Mining Services Applications
P. K. Mishra (2021)
10.1007/s11277-020-07385-0
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
D. Singh (2020)
10.1007/s11276-020-02451-8
User-sensor mutual authenticated key establishment scheme for critical applications in wireless sensor networks
A. Jabbari (2020)
10.1109/ACCESS.2019.2930542
A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map
Feifei Wang (2019)
10.1080/1206212X.2020.1825159
Cryptanalysis and improvement of mutual authentication protocol for real-time data access in industrial wireless sensor networks
Devender Kumar (2020)
10.1007/s12652-020-02020-z
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
R. Qazi (2020)
10.1007/S12652-020-02532-8
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
Devender Kumar (2020)
10.1109/ACCESS.2020.2979906
A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
Shuailiang Zhang (2020)
10.1016/J.COSE.2019.06.002
Anonymous authentication scheme for smart home environment with provable security
Mengxia Shuai (2019)
10.1007/s12065-020-00502-9
Research perceptions on ransomware attack: a complete analysis on conventional authentication protocols in network
P. A. Shemitha (2020)
10.1007/s12046-020-1319-2
A secure authentication framework for WSN-based safety monitoring in coal mines
Aman Ahmad Ansari (2020)
10.1007/S11277-020-07811-3
Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
A. Jabbari (2020)
Semantic Scholar Logo Some data provided by SemanticScholar