Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks

被引:24
|
作者
Renuka, Km [1 ]
Kumar, Sachin [2 ]
Kumari, Saru [1 ]
Chen, Chien-Ming [3 ]
机构
[1] Ch Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[2] Ajay Kumar Garg Engn Coll, Dept Comp Sci & Engn, Ghaziabad 201009, India
[3] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
关键词
wireless sensor networks; multi-factor authentication; fuzzy extractor; anonymity; provably security; 2-FACTOR USER AUTHENTICATION; SCHEME; SECURITY; ENCRYPTION;
D O I
10.3390/s19214625
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks (WSNs) are of prominent use in unmanned surveillance applications. This peculiar trait of WSNs is actually the underlying technology of various applications of the Internet of Things (IoT) such as smart homes, smart cities, smart shopping complexes, smart traffic, smart health, and much more. Over time, WSNs have evolved as a strong base for laying the foundations of IoT infrastructure. In order to address the scenario in which a user wants to access the real-time data directly from the sensor node in wireless sensor networks (WSNs), Das recently proposed an anonymity-preserving three-factor authentication protocol. Das's protocol is suitable for resource-constrained sensor nodes because it only uses lightweight cryptographic primitives such as hash functions and symmetric encryption schemes as building blocks. Das's protocol is claimed to be secure against different known attacks by providing formal security proof and security verification using the Automated Validation of Internet Security Protocols and Applications tool. However, we find that Das's protocol has the following security loopholes: (1) By using a captured sensor node, an adversary can impersonate a legal user to the gateway node, impersonate other sensor nodes to deceive the user, and the adversary can also decrypt all the cipher-texts of the user; (2) the gateway node has a heavy computational cost due to user anonymity and thus the protocol is vulnerable to denial of service (DoS) attacks. We overcome the shortcomings of Das's protocol and propose an improved protocol. We also prove the security of the proposed protocol in the random oracle model. Compared with the other related protocols, the improved protocol enjoys better functionality without much enhancement in the computation and communication costs. Consequently, it is more suitable for applications in WSNs
引用
收藏
页数:15
相关论文
共 50 条
  • [1] A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks
    Li, Yi
    Tian, Yuling
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6197 - 6208
  • [2] A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks
    Thakur, Garima
    Prajapat, Sunil
    Kumar, Pankaj
    Chen, Chien-Ming
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 154
  • [3] A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things
    Xie, Qi
    Ding, Zixuan
    Hu, Bin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks
    Nyangaresi, Vincent Omollo
    [J]. AD HOC NETWORKS, 2023, 142
  • [5] Cryptanalysis and improvement of an authentication protocol for wireless sensor networks
    Neerul
    Kumar, Devender
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (05):
  • [6] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Xie, Qi
    Li, Keheng
    Tan, Xiao
    Han, Lidong
    Tang, Wen
    Hu, Bin
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [7] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Qi Xie
    Keheng Li
    Xiao Tan
    Lidong Han
    Wen Tang
    Bin Hu
    [J]. EURASIP Journal on Wireless Communications and Networking, 2021
  • [8] A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks
    Zhu, Lianghong
    Xiang, Huaikun
    Zhang, Kai
    [J]. SYMMETRY-BASEL, 2022, 14 (01):
  • [9] An efficient three-factor authentication protocol for wireless healthcare sensor networks
    Saini, Khushil Kumar
    Kaur, Damandeep
    Kumar, Devender
    Kumar, Bijendra
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (23) : 63699 - 63721
  • [10] A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
    Wu, Tsu-Yang
    Yang, Lei
    Lee, Zhiyuan
    Chu, Shu-Chuan
    Kumari, Saru
    Kumar, Sachin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021