A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps

被引:143
作者
Kumari, Saru [1 ]
Li, Xiong [2 ]
Wu, Fan [3 ]
Das, Ashok Kumar [4 ]
Arshad, Hamed [5 ]
Khan, Muhammad Khurram [6 ]
机构
[1] Ch Charan Singh Univ, Dept Math, Meerut, Uttar Pradesh, India
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[3] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[4] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[5] Ferdowsi Univ Mashhad, Dept Comp Engn, Mashhad, Iran
[6] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2016年 / 63卷
基金
中国国家自然科学基金;
关键词
User authentication; Wireless sensor networks; User anonymity; Password guessing; Forward secrecy; Chaotic maps; SECURITY; PROTOCOL; CRYPTANALYSIS; IMPROVEMENT; FRAMEWORK; IDENTITY;
D O I
10.1016/j.future.2016.04.016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Spread of wireless network technology has opened new doors to utilize sensor technology in various areas via Wireless Sensor Networks (WSNs). Many authentication protocols for among the service seeker users, sensing component sensor nodes (SNs) and the service provider base-station or gateway node (GWN) are available to realize services from WSNs efficiently and without any fear of deceit. Recently, Li et al. and He et al. independently proposed mutual authentication and key agreement schemes for WSNs. We find that both the schemes achieve mutual authentication, establish session key and resist many known attacks but still have security weaknesses. We show the applicability of stolen verifier, user impersonation, password guessing and smart card loss attacks on Li et al.'s scheme. Although their scheme employs the feature of dynamic identity, an attacker can reveal and guess the identity of a registered user. We demonstrate the susceptibility of He et al.'s scheme to password guessing attack. In both the schemes, the security of the session key established between user and SNs is imperfect due to lack of forward secrecy and session specific temporary information leakage attack. In addition both the schemes impose extra computational load on resource scanty sensor-nodes and are not user friendly due to absence of user anonymity and lack of password change facility. To handle these drawbacks, we design a mutual authentication and key agreement scheme for WSN using chaotic maps. To the best of our knowledge, we are the first to propose an authentication scheme for WSN based on chaotic maps. We show the superiority of the proposed scheme over its predecessor schemes by means of detailed security analysis and comparative evaluation. We also formally analyze our scheme using BAN logic. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:56 / 75
页数:20
相关论文
共 83 条
[1]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]  
[Anonymous], CRYPTOLOGY EPRINT AR
[3]  
[Anonymous], 2002, Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, WSNA'02
[4]   Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks [J].
Bai Li ;
Batten, Lynn .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (02) :377-387
[5]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[6]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[7]  
Callaway E.H., 2003, WIRELESS SENSOR NETW
[8]  
Canetti R., 2001, ADV CRYPTOLOGY EUROC, P451
[9]  
Carlson J, 2003, FIFTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS & APPLICATIONS, PROCEEDINGS, P21
[10]   A new digital signature scheme based on chaotic maps [J].
Chain, Kai ;
Kuo, Wen-Chung .
NONLINEAR DYNAMICS, 2013, 74 (04) :1003-1012