Abstract
Secure user authentication is an indispensable issue in wireless sensor network (WSN) as the sensor nodes are deployed in public environment. In 2014, Nam et al. proposed their scheme in this regard. This manuscript highlights several limitations of Nam et al. protocol such as denial of service, no login phase verification, clock synchronization problem, improper mutual authentication, key-compromised impersonation and man-in-the-middle attack, and unverified password update phase. Hence, we put forward an efficient two-factor user authentication with session key interchange protocol for WSN (ASKI-WSN) based on elliptic curve cryptography (ECC) to overcome these limitations. The proposed ASKI-WSN scheme is informally verified under several security threats and formally validated using widely accepted automated validation of Internet security protocols and applications (AVISPA) tool. Finally, the performance analysis of our ASKI-WSN scheme in terms of security and computation cost shows its efficiency for practical applications as compared to some existing protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Survey on sensor network. IEEE Commun. Mag. 40, 102–114 (2002)
K.H.M. Wong, Y. Zheng, J. Cao, S. Wang, A dynamic user authentication scheme for wireless sensor networks, in Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (Taichung, Taiwan, 2006), pp. 244–251
M.L. Das, Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086–1090 (2009)
T.H. Chen, W.K. Shih, A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010)
H.L. Yeh, T.H. Chen, P.C. Liu, T.H. Kim, H.W. Wei, A secured authentication protocol for wireless sensor network using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)
W. Shi, P. Gong, A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw., Article ID 730831 (2013)
Y. Choi, D. Lee, J. Kin, J. Jung, J. Nam, D. Won, Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6), 10081–10106 (2014)
J. Nam, M. Kim, J. Paik, Y. Lee, D. Won, A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14(11), 21023–21044 (2014)
D. Dolev, A.C. Yao, On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198–208 (1983)
Q. Xie, D. Hong, M. Bao, N. Dong, D.S Wong, Privacy-preserving mobile roaming authentication with security proof in global mobility networks. Int. J. Distrib. Sens. Netw. 10(5), Article ID 325734 (2014)
C. Boyd, A. Mathuria, Protocols for Authentication and Key Establishment. Springer Science and Business Media (2013)
Y. Lu, L. Li, Y. Yang, Robust and efficient authentication scheme for session initiation protocol. Math. Prob. Eng., Article ID 894549 (2015)
P. Rogaway, T. Shrimpton, Cryptographic hash function basic: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. in Proceedings of International Workshop on Fast Software Encryption (2004), pp. 371–388
N. Koblitz, Elliptic curve cryptosystem. Math. Comput. 48(177), 203–209 (1987)
T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)
A. Armando, The AVISPA tool for the automated validation of internet security protocol and applications. in Computer Aided Verification (Springer, Berlin, Germany, 2005), pp. 281–285
D.V. Oheimb, The high-level protocol specification language HLPSL developed in the EU project AVISPA, in Proceedings of APPSEM Workshop (2005), pp. 1–17
D. Basin, S. Modersheim, L. Vigano, OFMC: a symbolic model checker for security protocol. Int. J. Inf. Secur. 4(3), 181–208 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Roy, P.K., Parai, K., Hasnat, A. (2018). User Authentication with Session Key Interchange for Wireless Sensor Network. In: Mandal, J., Mukhopadhyay, S., Dutta, P., Dasgupta, K. (eds) Methodologies and Application Issues of Contemporary Computing Framework. Springer, Singapore. https://doi.org/10.1007/978-981-13-2345-4_12
Download citation
DOI: https://doi.org/10.1007/978-981-13-2345-4_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2344-7
Online ISBN: 978-981-13-2345-4
eBook Packages: Computer ScienceComputer Science (R0)