An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function

被引:0
作者
Gaurav Tyagi
Rahul Kumar
机构
[1] Mahamana Malviya Degree College,Department of Mathematics
[2] Khekra (CCS University,Department of Mathematics
[3] Meerut),undefined
[4] Shri Saraswati Vidyalaya College,undefined
[5] Hapur (CCS University,undefined
[6] Meerut),undefined
来源
International Journal of Information Security | 2024年 / 23卷
关键词
Authentication; Security; Privacy; Smart card; Password; WSNs;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, smart card and password-based user authentication and key agreement schemes have become an integral mechanism to ensure only legitimate users get access to the data of wireless sensor networks (WSNs). In the recent past, lots of password-based multi-factor user authentication schemes have been developed by the researchers. However, most of them are not secure against various known attacks. Recently, two user authentication and key agreement schemes for WSNs are suggested by Chen and Chen (J Supercomput 77(12):13653–13675, 2021) and Qi and Chen (J Supercomput 77(12):13897–13910, 2021). They claim that their schemes are secure against all known attacks. We analyze the security of these schemes and demonstrate that these schemes are not secure against some common attacks (such as smart card lost attack) and do not provide common security features such as user untraceability and forward secrecy. By keeping all the merits of these schemes, we suggest a new provably secure user authentication and key agreement scheme using physically unclonable functions and elliptic curve cryptography. To verify the security and authentication properties of the suggested scheme, we use the well-known Proverif tool for formal security verification. We further prove its security informally. Finally, performance comparison with some recent schemes in terms of security features and computational cost is performed. Performance comparison results show the superiority of the suggested scheme over the existing schemes.
引用
收藏
页码:935 / 962
页数:27
相关论文
共 149 条
[1]  
Li X(2017)A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things IEEE Trans. Ind. Inf. 14 3599-3609
[2]  
Jianwei Niu Md(2002)Wireless sensor networks: a survey Comput. Netw. 38 393-422
[3]  
Bhuiyan ZA(2020)Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in wsns ACM Trans. Cyber Phys. Syst. 4 1-26
[4]  
Fan W(2014)Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks Ad Hoc Netw. 20 1-15
[5]  
Karuppiah M(2018)Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks IEEE Trans. Ind. Inform. 14 4081-4092
[6]  
Kumari S(2014)On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions Comput. Netw. 73 41-57
[7]  
Akyildiz IF(2017)A new and secure authentication scheme for wireless sensor networks with formal proof Peer-to-Peer Network. Appl. 10 16-30
[8]  
Su W(2016)A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks Peer-to-Peer Network. Appl. 9 223-244
[9]  
Sankarasubramaniam Y(2018)On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks Int. J. Distrib. Sens. Netw. 14 1550147718756311-1146
[10]  
Cayirci E(2018)Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things IEEE Trans. Depend. Secure Comput. 17 1133-204