Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 1/2019

21.12.2017

Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks

verfasst von: AmirHosein Adavoudi-Jolfaei, Maede Ashouri-Talouki, Seyed Farhad Aghili

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) play an important role and support a variety of real time applications, such as healthcare monitoring, military surveillance, vehicular tracking and, so on. Secure and real time information accessing from the sensor nodes in these applications is very important. Because wireless sensor nodes are limited in computing and communication capabilities and data storage, it is very crucial to design an effective and secure lightweight authentication and key agreement scheme. Recently, Gope et al. proposed a realistic lightweight anonymous authentication scheme in WSNs and claimed that their scheme satisfied all security concerns in these networks. However, we show that in their scheme the adversary can obtain the session key between the user and the sensor node. In order to fix this drawback, we propose an improved three-factor authentication scheme which is more suitable than Gope et al.’s scheme and also provides more desired security properties such as three-factor authentication and access control. Through the informal analysis, we show that our scheme is secure against various known attacks including the attack found in Gope et al.’s scheme. Furthermore, we have demonstrated the validity of our proposed scheme using the BAN logic. As compared with the previous authentication schemes, the proposed scheme is not only more secure but also enough practical and competitive with existing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Amin R, Islam SH, Biswas G, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62CrossRef Amin R, Islam SH, Biswas G, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62CrossRef
2.
Zurück zum Zitat Anastasi G, Conti M, Di Francesco M, Passarella A (2009) Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw 7(3):537–568CrossRef Anastasi G, Conti M, Di Francesco M, Passarella A (2009) Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw 7(3):537–568CrossRef
3.
Zurück zum Zitat Arasteh S, Aghili SF, Mala H (2016) A new lightweight authentication and key agreement protocol for internet of things. In: 2016 13th international iranian society of cryptology conference on information security and cryptology (ISCISC). IEEE, pp 52–59 Arasteh S, Aghili SF, Mala H (2016) A new lightweight authentication and key agreement protocol for internet of things. In: 2016 13th international iranian society of cryptology conference on information security and cryptology (ISCISC). IEEE, pp 52–59
4.
Zurück zum Zitat Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam PC, Kouchnarenko O, Mantovani J et al (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification. Springer, pp 281– 285 Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam PC, Kouchnarenko O, Mantovani J et al (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification. Springer, pp 281– 285
5.
Zurück zum Zitat Blanchet B (2014) Automatic verification of security protocols in the symbolic model: the verifier proverif. In: Foundations of security analysis and design VII. Springer, pp 54–87 Blanchet B (2014) Automatic verification of security protocols in the symbolic model: the verifier proverif. In: Foundations of security analysis and design VII. Springer, pp 54–87
6.
Zurück zum Zitat Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Transactions on Computer Systems (TOCS) 8(1):18–36MATHCrossRef Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Transactions on Computer Systems (TOCS) 8(1):18–36MATHCrossRef
7.
Zurück zum Zitat Chang CC, Le HD (2016) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357–366MathSciNetCrossRef Chang CC, Le HD (2016) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357–366MathSciNetCrossRef
8.
Zurück zum Zitat Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI journal 32(5):704–712CrossRef Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI journal 32(5):704–712CrossRef
9.
Zurück zum Zitat Das AK (2015) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1):1–25 Das AK (2015) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1):1–25
10.
Zurück zum Zitat Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wirel Pers Commun 82(3):1377–1404CrossRef Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wirel Pers Commun 82(3):1377–1404CrossRef
11.
Zurück zum Zitat Das AK (2016) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Networking and Applications 9(1):223–244CrossRef Das AK (2016) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Networking and Applications 9(1):223–244CrossRef
12.
Zurück zum Zitat Das AK, Chatterjee S, Sing JK (2015) A new biometric-based remote user authentication scheme in hierarchical wireless body area sensor networks. Adhoc & Sensor Wireless Networks 28:21–256 Das AK, Chatterjee S, Sing JK (2015) A new biometric-based remote user authentication scheme in hierarchical wireless body area sensor networks. Adhoc & Sensor Wireless Networks 28:21–256
13.
Zurück zum Zitat Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656CrossRef Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656CrossRef
14.
Zurück zum Zitat Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef
16.
Zurück zum Zitat Diffie W, Oorschot PC, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2(2):107–125MathSciNetCrossRef Diffie W, Oorschot PC, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2(2):107–125MathSciNetCrossRef
18.
Zurück zum Zitat Ekici E, Gu Y, Bozdag D (2006) Mobility-based communication in wireless sensor networks. IEEE Commun Mag 44(7):56CrossRef Ekici E, Gu Y, Bozdag D (2006) Mobility-based communication in wireless sensor networks. IEEE Commun Mag 44(7):56CrossRef
19.
Zurück zum Zitat Fan R, He DJ, Pan XZ et al (2011) An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University SCIENCE C 12(7):550–560CrossRef Fan R, He DJ, Pan XZ et al (2011) An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University SCIENCE C 12(7):550–560CrossRef
20.
Zurück zum Zitat Fan R, Ping LD, Fu JQ, Pan XZ (2010) A secure and efficient user authentication protocol for two-tiered wireless sensor networks. In: 2010 second pacific-asia conference on circuits, communications and system (PACCS), vol 1. IEEE, pp 425–428 Fan R, Ping LD, Fu JQ, Pan XZ (2010) A secure and efficient user authentication protocol for two-tiered wireless sensor networks. In: 2010 second pacific-asia conference on circuits, communications and system (PACCS), vol 1. IEEE, pp 425–428
21.
Zurück zum Zitat Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: 1990 IEEE computer society symposium on research in security and privacy, 1990. Proceedings. IEEE, pp 234–248 Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: 1990 IEEE computer society symposium on research in security and privacy, 1990. Proceedings. IEEE, pp 234–248
22.
Zurück zum Zitat Gope P, Hwang T (2015) A realistic lightweight authentication protocol preserving strong anonymity for securing rfid system. Comput Secur 55:271–280CrossRef Gope P, Hwang T (2015) A realistic lightweight authentication protocol preserving strong anonymity for securing rfid system. Comput Secur 55:271–280CrossRef
23.
Zurück zum Zitat Gope P, Hwang T (2016) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 10(4):1370–1379CrossRef Gope P, Hwang T (2016) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 10(4):1370–1379CrossRef
24.
Zurück zum Zitat Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132CrossRef Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132CrossRef
25.
Zurück zum Zitat He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad hoc & Sensor Wireless Networks 10(4):361–371 He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad hoc & Sensor Wireless Networks 10(4):361–371
26.
Zurück zum Zitat He D, Kumar N, Lee JH, Sherratt R (2014) Enhanced three-factor security protocol for consumer usb mass storage devices. IEEE Trans Consum Electron 60(1):30–37CrossRef He D, Kumar N, Lee JH, Sherratt R (2014) Enhanced three-factor security protocol for consumer usb mass storage devices. IEEE Trans Consum Electron 60(1):30–37CrossRef
27.
Zurück zum Zitat Huang HF, Chang YF, Liu CH (2010) Enhancement of two-factor user authentication in wireless sensor networks. In: 2010 sixth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP). IEEE, pp 27–30 Huang HF, Chang YF, Liu CH (2010) Enhancement of two-factor user authentication in wireless sensor networks. In: 2010 sixth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP). IEEE, pp 27–30
28.
Zurück zum Zitat Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390–1397CrossRef Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390–1397CrossRef
29.
Zurück zum Zitat Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 8(6):1070–1081CrossRef Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 8(6):1070–1081CrossRef
30.
Zurück zum Zitat Karl H, Willig A (2007) Protocols and architectures for wireless sensor networks. Wiley, New York Karl H, Willig A (2007) Protocols and architectures for wireless sensor networks. Wiley, New York
31.
Zurück zum Zitat Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459CrossRef Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459CrossRef
32.
Zurück zum Zitat Kumar P, Choudhury AJ, Sain M, Lee SG, Lee HJ (2011) Ruasn: a robust user authentication framework for wireless sensor networks. Sensors 11(5):5020–5046CrossRef Kumar P, Choudhury AJ, Sain M, Lee SG, Lee HJ (2011) Ruasn: a robust user authentication framework for wireless sensor networks. Sensors 11(5):5020–5046CrossRef
33.
Zurück zum Zitat Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5CrossRef Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5CrossRef
34.
Zurück zum Zitat Li X, Niu JW, Ma J, Wang WD, Liu CL (2011) Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 34(1):73–79CrossRef Li X, Niu JW, Ma J, Wang WD, Liu CL (2011) Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 34(1):73–79CrossRef
36.
Zurück zum Zitat Nyang D, Lee MK (2009) Improvement of das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive 2009:631 Nyang D, Lee MK (2009) Improvement of das’s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive 2009:631
37.
Zurück zum Zitat Odelu V, Das AK, Goswami A (2014) A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inform Sci 269:270–285MathSciNetMATHCrossRef Odelu V, Das AK, Goswami A (2014) A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inform Sci 269:270–285MathSciNetMATHCrossRef
38.
Zurück zum Zitat Qi J, Zhuo M, Jianfeng M, Guangsong L (2012) Security enhancement of robust user authentication framework for wireless sensor networks. China Communications 9(10):103–111 Qi J, Zhuo M, Jianfeng M, Guangsong L (2012) Security enhancement of robust user authentication framework for wireless sensor networks. China Communications 9(10):103–111
39.
Zurück zum Zitat Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetMATHCrossRef Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetMATHCrossRef
40.
Zurück zum Zitat Sun DZ, Li JX, Feng ZY, Cao ZF, Xu GQ (2013) On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers Ubiquit Comput 17(5):895–905CrossRef Sun DZ, Li JX, Feng ZY, Cao ZF, Xu GQ (2013) On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers Ubiquit Comput 17(5):895–905CrossRef
41.
Zurück zum Zitat Tan Z (2014) A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J Med Syst 38(3):16CrossRef Tan Z (2014) A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J Med Syst 38(3):16CrossRef
42.
Zurück zum Zitat Vaidya B, Makrakis D, Mouftah H (2016) Two-factor mutual authentication with key agreement in wireless sensor networks. Security and Communication Networks 9(2):171–183CrossRef Vaidya B, Makrakis D, Mouftah H (2016) Two-factor mutual authentication with key agreement in wireless sensor networks. Security and Communication Networks 9(2):171–183CrossRef
43.
Zurück zum Zitat Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: 2010 IEEE 6th international conference on wireless and mobile computing, networking and communications (wimob). IEEE, pp 600–606 Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: 2010 IEEE 6th international conference on wireless and mobile computing, networking and communications (wimob). IEEE, pp 600–606
44.
Zurück zum Zitat Wang CH, Lin CY (2011) An efficient delegation-based roaming payment protocol against denial of service attacks. In: 2011 international conference on electronics, communications and control (ICECC). IEEE, pp 4136–4140 Wang CH, Lin CY (2011) An efficient delegation-based roaming payment protocol against denial of service attacks. In: 2011 international conference on electronics, communications and control (ICECC). IEEE, pp 4136–4140
45.
Zurück zum Zitat Wang D, Wang P (2014) On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput Netw 73:41–57CrossRef Wang D, Wang P (2014) On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput Netw 73:41–57CrossRef
46.
Zurück zum Zitat Watro R, Kong D, Cuti SF, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks. ACM, pp 59–64 Watro R, Kong D, Cuti SF, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks. ACM, pp 59–64
47.
Zurück zum Zitat Wong KH, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, 2006, vol 1. IEEE, p 8 Wong KH, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, 2006, vol 1. IEEE, p 8
48.
Zurück zum Zitat Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef
49.
Zurück zum Zitat Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779CrossRef Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779CrossRef
50.
Zurück zum Zitat Yu J, Wang G, Mu Y, Gao W (2014) An efficient generic framework for three-factor authentication with provably secure instantiation. IEEE Trans Inf Forensics Secur 9(12):2302–2313CrossRef Yu J, Wang G, Mu Y, Gao W (2014) An efficient generic framework for three-factor authentication with provably secure instantiation. IEEE Trans Inf Forensics Secur 9(12):2302–2313CrossRef
Metadaten
Titel
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
verfasst von
AmirHosein Adavoudi-Jolfaei
Maede Ashouri-Talouki
Seyed Farhad Aghili
Publikationsdatum
21.12.2017
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2019
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-017-0627-8

Weitere Artikel der Ausgabe 1/2019

Peer-to-Peer Networking and Applications 1/2019 Zur Ausgabe

Premium Partner