Advertisement

Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines

  • Devender KumarEmail author
  • Satish Chand
  • Bijendra Kumar
Original Research
  • 98 Downloads

Abstract

The wireless sensor networks have several applications in different areas like medical, military, industry, safety, etc. Recently, Kumari and Om have discussed an authentication protocol for wireless sensor networks in coal mines for safety monitoring. In this paper, we cryptanalyze their scheme and find that it is vulnerable to the smart card loss attack, stolen verifier attack, and denial of service attack, besides other problems: (1) user traceability and (2) the sensor nodes are not anonymous. Here, we purpose an improved scheme by overcoming these limitations. We formally show the security analysis of our proposed scheme using random oracle and its security verification using the AVISPA tool. We carry out its informal analysis to show its resistivity to various known attacks. It requires less computational and storage costs, and is more secured than the related schemes. We also show its practical demonstration using NS2 simulator.

Keywords

User authentication Sensor node Coal mines Stolen verifier attack Session key agreement 

Notes

Acknowledgements

This work is supported by UPE-II, Jawaharlal Nehru University, New Delhi.

References

  1. Carlson J, Han R, Lao S, Narayan C, Sanghani S (2003) Rapid prototyping of mobile input devices using wireless sensor nodes. In: Mobile computing systems and applications, 2003. Proceedings. Fifth IEEE Workshop on, IEEE, pp 21–29Google Scholar
  2. Chandrakar P, Om H (2017) A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC. Comput Commun 110:26–34CrossRefGoogle Scholar
  3. Chen J, Salim MB, Matsumoto M (2011) A single mobile target tracking in voronoi-based clustered wireless sensor network. J Inf Process Syst 7(1):17–28CrossRefGoogle Scholar
  4. Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10,081–10,106CrossRefGoogle Scholar
  5. Claycomb WR, Shin D (2011) A novel node level security policy framework for wireless sensor networks. J Netw Comput Appl 34(1):418–428CrossRefGoogle Scholar
  6. Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1).  https://doi.org/10.1002/dac.2933
  7. Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur Commun Netw 9(13):2070–2092Google Scholar
  8. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRefGoogle Scholar
  9. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208MathSciNetCrossRefzbMATHGoogle Scholar
  10. Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132CrossRefGoogle Scholar
  11. Gope P, Lee J, Quek TQ (2016) Resilience of dos attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens J 17(2):498–503CrossRefGoogle Scholar
  12. Guha A, Kumar KV (2012) Structural controls on coal fire distributionsremote sensing based investigation in the Raniganj coalfield, West Bengal. J Geol Soc India 79(5):467–475CrossRefGoogle Scholar
  13. He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371Google Scholar
  14. He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015a) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49–60CrossRefGoogle Scholar
  15. He D, Kumar N, Chilamkurti N (2015b) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci 321:263–277CrossRefGoogle Scholar
  16. Huang HF, Chang YF, Liu CH (2010) Enhancement of two-factor user authentication in wireless sensor networks. In: Intelligent information hiding and multimedia signal processing (IIH-MSP), 2010 sixth international conference on, IEEE, pp 27–30Google Scholar
  17. Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017a) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electr EngGoogle Scholar
  18. Jiang Q, Zeadally S, Ma J, He D (2017b) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392CrossRefGoogle Scholar
  19. Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459CrossRefGoogle Scholar
  20. Kilinc HH, Yanik T (2014) A survey of sip authentication and key agreement schemes. IEEE Commun Surv Tutor 16(2):1005–1023CrossRefGoogle Scholar
  21. Ko LC (2008) A novel dynamic user authentication scheme for wireless sensor networks. In: 2008 IEEE international symposium on wireless communication systems, IEEE, pp 608–612Google Scholar
  22. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual international cryptology conference, Springer, pp 388–397Google Scholar
  23. Kumar A, Kingson T, Verma R, Mandal R, Dutta S, Chaulya S, Prasad G (2013) Application of gas monitoring sensors in underground coal mines and hazardous areas. Int J Comput Technol Electron Eng 3(3):9–23Google Scholar
  24. Kumar D, Aseri TC, Patel R (2011) Multi-hop communication routing (mcr) protocol for heterogeneous wireless sensor networks. Int J Inf Technol Commun Converg 1(2):130–145Google Scholar
  25. Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647CrossRefGoogle Scholar
  26. Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154CrossRefGoogle Scholar
  27. Li B, Batten L (2009) Using mobile agents to recover from node and database compromise in path-based dos attacks in wireless sensor networks. J Netw Comput Appl 32(2):377–387CrossRefGoogle Scholar
  28. Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589–9603CrossRefGoogle Scholar
  29. Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur Commun Netw 9:2643–2655CrossRefGoogle Scholar
  30. Liu Z, Li C, Wu D, Dai W, Geng S, Ding Q (2010) A wireless sensor network based personnel positioning scheme in coal mines with blind areas. Sensors 10(11):9891–9918CrossRefGoogle Scholar
  31. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRefzbMATHGoogle Scholar
  32. Shnayder V, Hempstead M, Chen Br, Allen GW, Welsh M (2004) Simulating the power consumption of large-scale sensor network applications. In: Proceedings of the 2nd international conference on Embedded networked sensor systems, ACM, pp 188–200Google Scholar
  33. Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE global telecommunications conference, IEEE, pp 986–990Google Scholar
  34. Vaidya B, Rodrigues JJ, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in ngn. Int J Commun Syst 23(9–10):1201–1222CrossRefGoogle Scholar
  35. Wang D, Wang P (2016) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput.  https://doi.org/10.1109/TDSC.2016.2605087 Google Scholar
  36. Wang J, Liu T, Song G, Xie H, Li L, Deng X, Gong Z (2014) Fiber bragg grating (fbg) sensors used in coal mines. Photonic Sens 4(2):120–124CrossRefGoogle Scholar
  37. Wong KH, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), IEEE, vol 1, p 8Google Scholar
  38. Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRefGoogle Scholar
  39. Zhao G (2011) Wireless sensor networks for industrial process monitoring and control: a survey. Netw Protoc Algorithms 3(1):46–63Google Scholar
  40. Zhao G, Kumar A (2011) Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks. Int J Inf Technol Commun Converg 1(3):297–317Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Division of Information TechnologyNetaji Subhas Institute of TechnologyNew DelhiIndia
  2. 2.School of Computer and Systems SciencesJawaharlal Nehru UniversityNew DelhiIndia
  3. 3.Division of Computer EngineeringNetaji Subhas Institute of TechnologyNew DelhIndia

Personalised recommendations