Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
Abstract
:1. Introduction
2. Review of the M.L. Das-Scheme
2.1. Registration Phase
2.2. Authentication Phase
- Login Phase
- In the login phase, Ui inserts his smart card into terminal and inputs IDi and pwi. The smart card validates the IDi and pwi with the stored values. If Ui is successfully authenticated, the smart card performs the following steps:
- Step- L1: Computes DIDi = h(IDi||pwi) ⊕ h(xa||T), where T is the current timestamp of Ui system
- Step- L2: Computes Ci = h(Ni||xa||T), then send < DIDi, Ci, T > to the GW-node
- Verification Phase
- Upon receiving the login request < DIDi, Ci, T > at time T*, the GW-node authenticates Ui by the following steps:
- Step-V1: Checks if (T* − T) ≤ ΔT then GW-node proceeds to the next step, otherwise verification step is terminated. Here ΔT shows the expected time interval for the transmission delay
- Step-V2: Computes h(IDi||pwi)* = DIDi ⊕ h(xa||T) and
- Step-V3: if then GW-node accepts the login request; otherwise login request is rejected.
- Step-V4: GW-node now sends a message < DIDi, Ai, T′ > to some nearest sensor Sn over a public channel to respond the query data what Ui is looking for, where the value of Ai is Ai = h(DIDi||Sn||xa||T′), where T′ is the current timestamp of the GW-node. Here, the value of Ai is used to ensure Sn that the message originally comes from the real GW-node.
- Step-V5: After receiving the message < DIDi, Ai, T′ >, the Sn validates the timestamp. If the timestamp is within valid interval, then Sn computes h(DIDi||Sn||xa||T′) and checks whether it is equal to Ai. If this step is passed, then Sn responds to the Ui’s query.
3. Cryptanalysis and Security Pitfalls of the M.L. Das-Scheme
3.1. GW-Node Bypassing Attack
- Suppose an adversary or Ui himself computes a fake dynamic identity DIDa by using the extracted xa from smart card DIDf = h(IDf ||pwf) ⊕ h(xa||Tf), where IDf is a fake ID of adversary, pwf is a randomly chosen fake password, and Tf is the current timestamp of adversary’s machine.
- Adversary computes Af = h(DIDf||Sn||xa||Tf), where Sn is the nearest sensor node for querying the data.
- Now, adversary sends the message < DIDf, Af, Tf > to Sn over insecure communication channel.
- After receiving the message, Sn first validates Tf. If (T* − Tf) ≤ ΔT, then Sn proceeds to next step, otherwise terminates the operation. Here, ΔT shows the expected time interval for the transmission delay.
- Sn now computes A′f = h(DIDf||Sn||xa||Tf) and checks whether the value of or not. If it holds, Sn responds to the adversary’s query, and Ua, who is an adversary and not a legitimate user of the sensor network system, enjoys the resources as an authorized user without being a member of the system.
3.2. No Mutual Authentication between GW and Sensor Nodes
3.3. Privileged-Insider Attack
3.4. No Provision for Changing/Updating Passwords
4. Proposed Security Improvements and Analysis
4.1. Introducing Password Change Phase
- Computes , where the value of Ni is already stored on smart card i.e. Ni = h(IDi||pwi) ⊕ h(K)
- Smart card replaces the old value of Ni with the new values and . Now, the new password is successfully changed and this phase is terminated.
4.2. Protection against Insider Attack
4.3. Overcoming GW-node Bypassing Attack and Providing Mutual Authentication
- After accepting the login request of Ui, the GW-node sends message < DIDi, Ai, T′ >, to some nearest sensor node Sn to respond the query/data of Ui, where Ai is computed by Ai = h(DIDi||Sn||xs||T′). Here xs is the secret parameter, which is securely stored in sensor node Sn and shared only with the GW-node, and T′ is the current timestamp of GW-node’s system.
- Upon receiving the message < DIDi, Ai, T′ >, the designated sensor node validates the timestamp. If (T″ − T′) ≤ ΔT, then Sn proceeds to next step, otherwise terminates the further operation. Here, ΔT shows the expected time interval for the transmission delay and T″ is the current timestamp of sensor node Sn.
- Sn now computes and checks whether or not. If it holds, then Sn responds to Ui’s query, otherwise terminates the operation.
- To provide mutual authentication between GW-node and sensor node, Sn now computes Bi = h(Sn||xs||T″′). Here T″′ is the current timestamp of sensor node’s system and sends back mutual authentication message < Bi, T″′ > to the GW-node.
- After receiving the mutual authentication message < Bi, T″′ >, the GW-node first checks the validity of time-stamp. If (T″″ − T″′) ≤ ΔT, then GW node performs the further operations, otherwise the mutual authentication phase is terminated. Here, ΔT shows the expected time interval for the transmission delay and T″″ is the current timestamp of GW-node.
- GW-node now computes and checks whether or not. If it is true, then GW-node establishes trust on sensor node, otherwise, GW-node intimates Ui about the possibility of malicious sensor node in the network and sends a process-termination message.
- After successful authentication, Ui enjoys the resources provided by the sensor network.
5. Performance Analysis of Proposed Scheme
6. Conclusions
References and Notes
- Chiara, B.; Andrea, C.; Davide, D.; Roberto, V. An Overview on Wireless Sensor Networks Technology and Evolution. Sensors 2009, 9, 6869–6896. [Google Scholar]
- Callaway, E.H. Wireless Sensor Networks, Architectures and Protocols; Auerbach Publications, Taylor & Francis Group: Boca Raton, FL, USA, 2003. [Google Scholar]
- Chong, C.Y.; Kumar, S. Sensor Networks: Evolution, Opportunities, and Challenges. Proc. IEEE 2003, 91, 1247–1256. [Google Scholar]
- Benenson, Z.; Felix, C.G.; Dogan, K. User Authentication in Sensor Networks. Proceedings of Workshop Sensor Networks, Ulm, Germany; 2004; pp. 385–389. [Google Scholar]
- Watro, R.; Derrick, K.; Sue-fen, C.; Charles, G.; Charles, L.; Peter, K. TinyPK: Securing Sensor Networks with Public Key Technology. Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, Washington, DC, USA; 2004; pp. 59–64. [Google Scholar]
- Wong, K.H.M; Yuan, Z.; Jiannong, C.; Shengwei, W. A dynamic user authentication scheme for wireless sensor networks. Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan; 2006; pp. 244–251. [Google Scholar]
- Tseng, H.R.; Jan, R.H.; Yang, W. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks. Proceedings of IEEE Globecom, Washington, DC, USA; 2007; pp. 986–990. [Google Scholar]
- Tsern, H.L. Simple Dynamic User Authentication Protocols for Wireless Sensor Networks. Proceedings of 2nd International Conference on Sensor Technologies and Applications, Cap Esterel, France; 2008; pp. 657–660. [Google Scholar]
- Ko, L.C. A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks. Proceedings of IEEE ISWCS, Reykjavik, Iceland; 2008; pp. 608–612. [Google Scholar]
- Binod, V.; Jorge, S.S.; Joel, J.P.C.R. Robust Dynamic User Authentication Scheme for Wireless Sensor Networks. Proceedings of ACM Q2SWinet, Canary Islands, Spain; 2009; pp. 88–91. [Google Scholar]
- Das, M.L. Two-Factor User Authentication in Wireless Sensor Networks. IEEE Trans. Wireless Comm 2009, 8, 1086–1090. [Google Scholar]
- Kocher, P.; Jaffe, J.; Jun, B. Differential Power Analysis. Proceedings of 19th International Advances in Cryptology Conference CRYPTO, Santa Barbara, CA, USA; 1999; pp. 388–397. [Google Scholar]
- Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining Smartcard Security under the Threat of Power Analysis Attacks. IEEE Trans. Comp 2002, 51, 541–552. [Google Scholar]
- Khan, M.K.; Zhang, J. Improving the Security of ‘A Flexible Biometrics Remote User Authentication Scheme’. Comp. Stand. Interf. Elsevier Sci 2007, 29, 82–85. [Google Scholar]
- Ku, W.C.; Chen, S.M. Weaknesses and Improvements of An Efficient Password based Remote user Authentication Scheme using Smart Cards. IEEE Trans. Cons. Elec 2004, 50, 204–207. [Google Scholar]
- Wang, X.; Zhang, W.; Zhang, J.; Khan, M.K. Cryptanalysis and Improvement on Two Efficient Remote User Authentication Scheme using Smart Cards. Comp. Stand. Intefr. Elsevier Sci 2007, 29, 507–512. [Google Scholar]
- Nyang, DH.; Lee, M.K. Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks. Cryptology. ePrint Archive 2009/631. Online PDF: http://eprint.iacr.org/2009/631.pdf (accessed on 28 February 2010).
Security Features and Performance | Proposed scheme | M.L. Das [11] | Nyang-Lee [17] |
---|---|---|---|
Securely change/update password | Yes | No | No |
Protection against insider’s attack | Yes | No | No |
Protection against Gateway node bypassing attack | Yes | No | No |
Mutual authentication between GW and sensor nodes | Yes | No | Yes |
Computational operations in registration phase | 3H | 2H | 2H |
Computational operations in login phase | 3H | 3H | 3H |
Computational operations in verification phase | 7H | 5H | 12H |
© 2010 by the authors; licensee Molecular Diversity Preservation International, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
Share and Cite
Khan, M.K.; Alghathbar, K. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’. Sensors 2010, 10, 2450-2459. https://doi.org/10.3390/s100302450
Khan MK, Alghathbar K. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’. Sensors. 2010; 10(3):2450-2459. https://doi.org/10.3390/s100302450
Chicago/Turabian StyleKhan, Muhammad Khurram, and Khaled Alghathbar. 2010. "Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’" Sensors 10, no. 3: 2450-2459. https://doi.org/10.3390/s100302450