Abstract
In 2012, Das et al. proposed a new password-based user authentication scheme in hierarchical wireless sensor networks [Journal of Network and Computer Applications 35(5) (2012) 1646-1656]. The proposed scheme achieves better security and efficiency as compared to those for other existing password-based user authentication schemes proposed in the literature. This scheme supports to change dynamically the user’s password locally at any time without contacting the base station or gateway node. This scheme also supports dynamic node addition after the initial deployment of nodes in the existing sensor network. In this paper, we simulate this proposed scheme for formal security verification using the widely-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. AVISPA tool ensures that whether a protocol is insecure against possible passive and active attacks, including the replay and man-in-the-middle attacks. Using the AVISPA model checkers, we show that Das et al.’s scheme is secure against possible passive and active attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Advanced Encryption Standard (AES), FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (November 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Automated Validation of Internet Security Protocols and Applications, Avispa Tool Documentation, http://www.avispa-project.org/package/user-manual.pdf (accessed on March 2013)
Automated validation of internet security protocols and applications, AVISPA Web Tool, http://www.avispa-project.org/web-interface/expert.php/ (accessed on January 2013)
Secure Hash Standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (April 1995)
Wireless Sensor Networks, Crossbow Technology Inc., http://www.xbow.com (accessed on September 2011)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A Survey. Computer Networks 38(4), 393–422 (2002)
Armando, A., et al.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)
Basin, D., Modersheim, S., Vigano, L.: OFMC: A symbolic model checker for security protocols. International Journal of Information Security 4(3), 181–208 (2005)
Chatterjee, S., Das, A.K., Sing, J.K.: An Enhanced Access Control Scheme in Wireless Sensor Networks. Ad Hoc & Sensor Wireless Networks (in presss, 2013)
Das, A.K.: An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks. In: First IEEE International Conference on Communication Systems and Networks (COMSNETS 2009), pp. 1–10 (2009)
Das, A.K.: A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Networking Science 2(1-2), 12–27 (2013)
Das, A.K., Chatterjee, S., Sing, J.K.: A novel efficient access control scheme for large-scale distributed wireless sensor networks. International Journal of Foundations of Computer Science (in press, 2013)
Das, A.K., Massand, A., Patil, S.: A novel proxy signature scheme based on user hierarchical access control policy. Journal of King Saud University - Computer and Information Sciences (2013), http://dx.doi.org/10.1016/j.jksuci.2012.12.001
Das, A.K., Sengupta, I.: An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. In: 3rd IEEE International Conference on Communication Systems Software and Middleware (COMSWARE 2008), pp. 9–16 (2008)
Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications 35(5), 1646–1656 (2012)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)
von Oheimb, D.: The high-level protocol specification language hlpsl developed in the eu project avispa. In: Proceedings of APPSEM Workshop (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Das, A.K., Chatterjee, S., Sing, J.K. (2013). Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks. In: Thampi, S.M., Atrey, P.K., Fan, CI., Perez, G.M. (eds) Security in Computing and Communications. SSCC 2013. Communications in Computer and Information Science, vol 377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40576-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-40576-1_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40575-4
Online ISBN: 978-3-642-40576-1
eBook Packages: Computer ScienceComputer Science (R0)