Abstract
The rapid development of wireless sensor networks (WSNs) has brought great convenience to people’s lives, as well as huge security challenges. Recently, Kaur et al. proposed an improved user authentication protocol for WSNs. However, we find that their protocol cannot provide user untraceability and perfect forward security, and it fails to resist the privileged insider attack because it only uses lightweight cryptographic primitive to ensure the security of the scheme. To overcome the weaknesses in Kaur et al.’s protocol, we propose a secure anonymous authentication with key agreement protocol for WSNs. It uses self-certified public key cryptography to guarantee confidentiality, security and availability in public channels. Additionally, through formal and informal security proofs, we demonstrate that the proposed scheme can achieve the expected security properties. By comparing with other related protocols on execution time and communication cost, we find that our protocol is more secure and efficient.
Similar content being viewed by others
References
Amin R, Hafizul Islam SK, Biswas GP, Khan MK, Leng L u, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101(jun.4):42–62
Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Acm Trans Comput Syst 23(5):1–13
Chain K, Kuo WC, Chang KH (2015) Enhancement key agreement scheme based on chaotic maps. Int J Comput Appl 37(2):67–72
Chang CC, Lin IC (2004) Remarks on fingerprint-based remote user authentication scheme using smart cards. Acm Sigops Operating Systems Review 38 (4):91–96
Danny D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090
Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 25(1):e2933.1–e2933
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 523–540
Fan CI, Chan YC, Zhang ZK (2005) Robust remote authentication scheme with smart cards. Comput Secur 24(8):619–628
Fan CI, Lin YH (2009) Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Transactions on Information Forensics and Security 4(4):933–945
Farash MS, Turkanovi M, Kumari S, Hlbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36 (P1):152–176
Gong P, Li P, Shi W (2012) A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dynamics 70(4):2401–2406
He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci 321:263–277
He D, Kumar N, Khan MK, Lee J (2013) Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans Consum Electron 59(4):811–817
He D, Wang D (2014) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823
Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390–1397
Jabbari A, Mohasefi JB (2019) Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dynam 95(4):3177–3191
Jangirala S, Kumar DA, Mohammad W, Neeraj K (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Depend Secure Comput 1–1
Ji LL, Zhang WG, Kumari S, Choo KKR, Hogrefe D (2018) Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans Emerging Telecommun Technol 29 (15):e3295
Juang WS, Chen ST, Liaw HT (2008) Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 55(6):2551–2556
Khan MK, Zhang J, Wang X (2008) Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons and Fractals 35(3):519–524
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual international cryptology conference. Springer, Berlin, pp 388–397
Ku WC, Chang ST, Chiang MH (2005) Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards. Electron Lett 41 (5):240–241
Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647
Kumar P, Quadri M, Sharma K, Gia NN, Ranjan P (2018) Persistent cellular telephony: Enhanced secure gsm architecture. Recent Patents on Engineering 12(1):23–29
Kumari R, Sharma K (2018) Cross-layer based intrusion detection and prevention for network. In: Handbook of research on network forensics and analysis techniques. IGI Global, pp 38–56
Lamport L (1981) Password authentication with insecure communication. Communications of the Acm 24(11):770–772
Lee CC, Li CT, Chiu ST, Lai Yan-Ming (2015) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dynam 79(4):2485–2495
Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5
Li X, Niu J, Khan MK, Liao J, Zhao X (2016) Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Secur Commun Netw 9(13):1916–1927
Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497
Lin CH, Lai YY (2005) A flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 27(1):19–23
Lwamo NMR, Zhu L, Xu C, Sharif K, Liu XB, Zhang C (2019) Suaa: a secure user authentication scheme with anonymity for the single and multi-server environments. Inf Sci 477:369–385
Mishra D, Kumari S, Khan MK, Mukhopadhyay S (2017) An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Int J Commun Syst 14(1):e2946.1–e2946
Nayyar A, Singh R (2015) A comprehensive review of simulation tools for wireless sensor networks (wsns). J Wireless Netw Commun 5(1):19–47
Niu Y, Wang X (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 16(4):1986–1992
Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inform Forensics Secur 10(9):1–1
Ojha RP, Sharma K, Srivastava PK, Sanyal G (2019) An epidemic model for security and performance of wireless sensor networks. Int J Advanced Intell Paradigms 13:113–129
Qi M, Chen J, Chen Y (2018) A secure biometrics-based authentication key exchange protocol for multi-server tmis using ecc. Comput Methods Prog Biomed 164:101–109
Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2018) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Int Things J 5(4):2884–2895
Saini KKKD, Kumar D (2019) An improved user authentication protocol for wireless sensor networks. Trans Emerging Telecommun Technol 30:e3745
Saru K, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63(oct.):56–75
Sharma K, Bala S, Bansal H, Shrivastava G (2017) Introduction to the special issue on secure solutions for network in scalable computing. Scalable Computing: Practice and Experience 18(3)
Srivastava PK, Ojha RP, Sharma K, Awasthi S, Sanyal G (2018) Effect of quarantine and recovery on infectious nodes in wireless sensor network. International Journal of Sensors Wireless Communications and Control 8 (1):26–36
Sun DZ, Huai JP, Ji ZS, Li JX, Feng ZY (2009) Improvements of Juang’s password-authenticated key agreement scheme using smart cards. IEEE Trans Ind Electron 56(6):2284–2291
Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pp 986–990
Tseng H, Jan R, Yang W (2009) A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE International Conference on Communications (ICC’09), 1–6
Turkanovic M, Brumen B, Holbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112
Wang Y (2012) Password protected smart card and memory stick authentication against off-line dictionary attacks. In: IFIP international information security conference. Springer, Berlin, pp 489–500
Wang X, Gao Y (2010) A switch-modulated method for chaos digital secure communication based on user-defined protocol. Commun Nonlinear Sci Numer Simul 15(1):99–104
Wang X, Wang S, Wang Z, Zhang M (2016) A new key agreement protocol based on chebyshev chaotic maps. Secur Commun Netw 9(18):5028–5035
Wang X, Zhang D, Guo X (2013) Authentication and recovery of images using standard deviation. J Electron Imaging 22(3):033012–033012
Wang X, Zhao J (2010) An improved key agreement protocol based on chaos. Commun Nonlinear Sci Numer Simul 15(12):4052–4057
Watro RJ, Kong D, Cuti SF, Gardiner C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: ACM workshop on security of Ad Hoc and sensor networks, pp 59–64
Wong KHM, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, pp 1–8
Xingyuan W, Dapeng L (2013) A secure key agreement protocol based on chaotic maps. Chinese Physics B 22(11):110503
Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, Y., Chen, J. Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks. Multimed Tools Appl 80, 15291–15313 (2021). https://doi.org/10.1007/s11042-020-10259-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10259-z