Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks

被引:22
作者
Li, Wenting [1 ,2 ]
Li, Bin [1 ]
Zhao, Yiming [1 ]
Wang, Ping [1 ,3 ]
Wei, Fushan [2 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[3] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
KEY AGREEMENT SCHEME; EFFICIENT USER AUTHENTICATION; MUTUAL AUTHENTICATION; PROTOCOL; INTERNET;
D O I
10.1155/2018/8539674
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and academic community. To facilitate real-time data access for external users from the sensor nodes directly, password-based authentication has become the prevalent authentication mechanism in the past decades. In this work, we investigate three foremost protocols in the area of password-based user authentication scheme for WSNs. Firstly, we analyze an efficient and anonymous protocol and demonstrate that though this protocol is equipped with a formal proof, it actually has several security loopholes been overlooked, such that it cannot resist against smart card loss attack and violate forward secrecy. Secondly, we scrutinize a lightweight protocol and point out that it cannot achieve the claimed security goal of forward secrecy, as well as suffering from user anonymity violation attack and offline password guessing attack. Thirdly, we find that an anonymous scheme fails to preserve two critical properties of forward secrecy and user friendliness. In addition, by adopting the "perfect forward secrecy (PFS)" principle, we provide several effective countermeasures to remedy the identified weaknesses. To test the necessity and effectiveness of our suggestions, we conduct a comparison of 10 representative schemes in terms of the underlying cryptographic primitives used for realizing forward secrecy.
引用
收藏
页数:11
相关论文
共 59 条
[1]   A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring [J].
Ali, Rifaqat ;
Pal, Arup Kumar ;
Kumari, Saru ;
Karuppiah, Marimuthu ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :200-215
[2]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[3]  
[Anonymous], LNCS
[4]  
[Anonymous], 2016, IEEE T DEPENDABLE SE
[5]   Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model [J].
Bang, June-ho ;
Cho, Young-jong ;
Kang, Kyungran .
COMPUTERS & SECURITY, 2017, 65 :108-120
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Bras T.L., 2015, Online overload-it's worse than you thought
[8]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[9]  
Chalupar G., 2014, WOOT14 USENIX WORKSH, P1
[10]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366