Multi-factor User Authentication Scheme for Multi-gateway Wireless Sensor Networks

被引:0
|
作者
Wang C.-Y. [1 ]
Wang D. [2 ,3 ]
Wang F.-F. [1 ]
Xu G.-A. [1 ]
机构
[1] School of Cyber-security, Beijing University of Posts and Telecommunications, Beijing
[2] College of Cyber Science, Nankai University, Tianjin
[3] National Engineering Laboratory of Mobile Network Security, Nankai University, Tianjin
来源
关键词
Forward secrecy; Impersonation attack; Multi-gateway wireless sensor networks; Offline-dictionary attack; Password-based authentication protocol;
D O I
10.11897/SP.J.1016.2020.00683
中图分类号
学科分类号
摘要
Wireless sensor networks, as a fundamental infrastructure of internet of things, have played an important role in security-critical applications, such as environmental monitoring, personas health and smart home. User authentication can guarantee that users securely access real-time data in sensor nodes, and it is the first line of defense to ensure the security of wireless sensor networks. In addition, forward security can be regarded as the last line of defense for the security of systems, which can greatly reduce the loss of information security after the system is compromised. Therefore, it has been regarded as an important security attribute by academics and industry. The design of a multi-factor user authentication for multi-gateway wireless sensor networks has attracted intensive discussions in the field of security protocols. However, confronted with a powerful adversary, resource-constrained hardware and an impressive list of attributes, it is full of challenging in designing a secure user authentication scheme for multi-gateway wireless sensor networks.Recently, many multi-factor user authentication schemes for multi-gateway wireless sensor networks are proposed, but most of them are found insecure shortly. Specifically, most of them cannot resist smart card loss attacks, insider attacks and cannot achieve user anonymity and forward secrecy. In 2018, Ali et al. proposed a multi-factor user authentication scheme for agriculture monitoring under multi-gateway wireless sensor networks. In Ali et al.'s scheme, a trusted center (base station) is required to support the authentication between users and sensor nodes that are not connected to the home gateway. In the same year, Srinivas et al.'s also presented a multi-factor authentication for multi-gateway wireless sensor networks, their scheme does not need a trusted center, and it builds a shared secret key to finish the authentication between users and foreign sensor nodes. These two schemes are typical representatives of multi-factor user authentication schemes for multi-gateway wireless sensor networks, and they represent two types of authentication methods for the authentication between different gateways: 1) based on the trusted base station; 2) based on the shared secret parameters. In this paper, we analyze these two recent typical user authentication schemes for multi-gateway wireless sensor networks, hoping to take these two schemes as study cases to identify the common weaknesses of user authentication schemes and providing corresponding specific solutions. We find that they both are vulnerable to offline-dictionary guessing attack, insider attack and fail to achieve forward secrecy and user anonymity. To overcome these weaknesses, we propose an enhanced multi-factor user authentication scheme for multi-gateway wireless sensor networks with forward secrecy. The proposed scheme adopts Srinivas et al.'s method and achieves the authentication between users and foreign sensor nodes by using a shared secret key among gateways, including two typical authentication scenarios. We prove that it achieves mutual authentication, provides secure session key agreement and can resist to know attacks via BAN logic and heuristic analysis. We compare it with several typical relevant user authentication schemes for multi-gateway wireless sensor networks from the security and performance. The results show that the proposed scheme provides better security for the applications of multi-gateway wireless sensor networks that have high security requirements, and thus it is more suitable to resource-constrained environments. © 2020, Science Press. All right reserved.
引用
收藏
页码:683 / 700
页数:17
相关论文
共 25 条
  • [1] Wazid M., Das A.K., Odelu V., Kumar N., Susilo W., Secure remote user authenticated key establishment protocol for smart home environment, IEEE Transactions on Dependable and Secure Computing, (2017)
  • [2] Kumari S., Om H., Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines, Computer Networks, 104, C, pp. 137-154, (2016)
  • [3] Gupta A., Tripathi M., Shaikh T.J., Sharma A., A Lightweight Anonymous User Authentication and Key Establishment Scheme for Wearable Devices, Computer Networks, 149, A, pp. 29-42, (2019)
  • [4] Wazid M., Das A.K., Odelu V., Kumar N., Conti M., Jo M., Design of secure user authenticated key management protocol for generic iot networks, IEEE Internet of Things Journal, 5, 1, pp. 269-282, (2017)
  • [5] Srinivas J., Mukhopadhyay S., Mishra D., Secure and efficient user authentication scheme for multi-gateway wireless sensor networks, Ad Hoc Networks, 54, A, pp. 147-169, (2017)
  • [6] Wang D., Li W., Wang P., Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks, IEEE Transactions on Industrial Informatics, 14, 9, pp. 4081-4092, (2018)
  • [7] Ali R., Pal A.K., Kumari S., Karuppiah M., Conti M., A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring, Future Generation Computer Systems, 84, C, pp. 200-215, (2018)
  • [8] Das M.L., Two-factor user authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, 8, 3, pp. 1086-1090, (2009)
  • [9] Khan M.K., Alghathbar K., Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks, Sensors, 10, 3, pp. 2450-2459, (2010)
  • [10] Chen T.H., Shih W.K., A robust mutual authentication protocol for wireless sensor networks, ETRI Journal, 32, 5, pp. 704-712, (2010)