Skip to main content
Log in

Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The rapid development of wireless sensor networks (WSNs) has brought great convenience to people’s lives, as well as huge security challenges. Recently, Kaur et al. proposed an improved user authentication protocol for WSNs. However, we find that their protocol cannot provide user untraceability and perfect forward security, and it fails to resist the privileged insider attack because it only uses lightweight cryptographic primitive to ensure the security of the scheme. To overcome the weaknesses in Kaur et al.’s protocol, we propose a secure anonymous authentication with key agreement protocol for WSNs. It uses self-certified public key cryptography to guarantee confidentiality, security and availability in public channels. Additionally, through formal and informal security proofs, we demonstrate that the proposed scheme can achieve the expected security properties. By comparing with other related protocols on execution time and communication cost, we find that our protocol is more secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Amin R, Hafizul Islam SK, Biswas GP, Khan MK, Leng L u, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101(jun.4):42–62

    Article  Google Scholar 

  2. Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Acm Trans Comput Syst 23(5):1–13

    MATH  Google Scholar 

  3. Chain K, Kuo WC, Chang KH (2015) Enhancement key agreement scheme based on chaotic maps. Int J Comput Appl 37(2):67–72

    Google Scholar 

  4. Chang CC, Lin IC (2004) Remarks on fingerprint-based remote user authentication scheme using smart cards. Acm Sigops Operating Systems Review 38 (4):91–96

    Article  Google Scholar 

  5. Danny D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MathSciNet  MATH  Google Scholar 

  6. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090

    Article  Google Scholar 

  7. Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 25(1):e2933.1–e2933

    Google Scholar 

  8. Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 523–540

  9. Fan CI, Chan YC, Zhang ZK (2005) Robust remote authentication scheme with smart cards. Comput Secur 24(8):619–628

    Article  Google Scholar 

  10. Fan CI, Lin YH (2009) Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Transactions on Information Forensics and Security 4(4):933–945

    Article  Google Scholar 

  11. Farash MS, Turkanovi M, Kumari S, Hlbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36 (P1):152–176

    Article  Google Scholar 

  12. Gong P, Li P, Shi W (2012) A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dynamics 70(4):2401–2406

    Article  MathSciNet  Google Scholar 

  13. He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci 321:263–277

    Article  Google Scholar 

  14. He D, Kumar N, Khan MK, Lee J (2013) Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans Consum Electron 59(4):811–817

    Article  Google Scholar 

  15. He D, Wang D (2014) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823

    Article  Google Scholar 

  16. Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390–1397

    Article  Google Scholar 

  17. Jabbari A, Mohasefi JB (2019) Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dynam 95(4):3177–3191

    Article  MATH  Google Scholar 

  18. Jangirala S, Kumar DA, Mohammad W, Neeraj K (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Depend Secure Comput 1–1

  19. Ji LL, Zhang WG, Kumari S, Choo KKR, Hogrefe D (2018) Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans Emerging Telecommun Technol 29 (15):e3295

    Google Scholar 

  20. Juang WS, Chen ST, Liaw HT (2008) Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 55(6):2551–2556

    Article  Google Scholar 

  21. Khan MK, Zhang J, Wang X (2008) Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons and Fractals 35(3):519–524

    Article  Google Scholar 

  22. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual international cryptology conference. Springer, Berlin, pp 388–397

  23. Ku WC, Chang ST, Chiang MH (2005) Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards. Electron Lett 41 (5):240–241

    Article  Google Scholar 

  24. Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647

    Article  Google Scholar 

  25. Kumar P, Quadri M, Sharma K, Gia NN, Ranjan P (2018) Persistent cellular telephony: Enhanced secure gsm architecture. Recent Patents on Engineering 12(1):23–29

    Article  Google Scholar 

  26. Kumari R, Sharma K (2018) Cross-layer based intrusion detection and prevention for network. In: Handbook of research on network forensics and analysis techniques. IGI Global, pp 38–56

  27. Lamport L (1981) Password authentication with insecure communication. Communications of the Acm 24(11):770–772

    Article  MathSciNet  Google Scholar 

  28. Lee CC, Li CT, Chiu ST, Lai Yan-Ming (2015) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dynam 79(4):2485–2495

    Article  MathSciNet  MATH  Google Scholar 

  29. Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5

    Article  Google Scholar 

  30. Li X, Niu J, Khan MK, Liao J, Zhao X (2016) Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Secur Commun Netw 9(13):1916–1927

    Google Scholar 

  31. Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497

    Google Scholar 

  32. Lin CH, Lai YY (2005) A flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 27(1):19–23

    Article  Google Scholar 

  33. Lwamo NMR, Zhu L, Xu C, Sharif K, Liu XB, Zhang C (2019) Suaa: a secure user authentication scheme with anonymity for the single and multi-server environments. Inf Sci 477:369–385

    Article  Google Scholar 

  34. Mishra D, Kumari S, Khan MK, Mukhopadhyay S (2017) An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Int J Commun Syst 14(1):e2946.1–e2946

    Google Scholar 

  35. Nayyar A, Singh R (2015) A comprehensive review of simulation tools for wireless sensor networks (wsns). J Wireless Netw Commun 5(1):19–47

    Google Scholar 

  36. Niu Y, Wang X (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 16(4):1986–1992

    Article  MathSciNet  MATH  Google Scholar 

  37. Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inform Forensics Secur 10(9):1–1

    Article  Google Scholar 

  38. Ojha RP, Sharma K, Srivastava PK, Sanyal G (2019) An epidemic model for security and performance of wireless sensor networks. Int J Advanced Intell Paradigms 13:113–129

    Article  Google Scholar 

  39. Qi M, Chen J, Chen Y (2018) A secure biometrics-based authentication key exchange protocol for multi-server tmis using ecc. Comput Methods Prog Biomed 164:101–109

    Article  Google Scholar 

  40. Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2018) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Int Things J 5(4):2884–2895

    Article  Google Scholar 

  41. Saini KKKD, Kumar D (2019) An improved user authentication protocol for wireless sensor networks. Trans Emerging Telecommun Technol 30:e3745

    Google Scholar 

  42. Saru K, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63(oct.):56–75

    Google Scholar 

  43. Sharma K, Bala S, Bansal H, Shrivastava G (2017) Introduction to the special issue on secure solutions for network in scalable computing. Scalable Computing: Practice and Experience 18(3)

  44. Srivastava PK, Ojha RP, Sharma K, Awasthi S, Sanyal G (2018) Effect of quarantine and recovery on infectious nodes in wireless sensor network. International Journal of Sensors Wireless Communications and Control 8 (1):26–36

    Article  Google Scholar 

  45. Sun DZ, Huai JP, Ji ZS, Li JX, Feng ZY (2009) Improvements of Juang’s password-authenticated key agreement scheme using smart cards. IEEE Trans Ind Electron 56(6):2284–2291

    Article  Google Scholar 

  46. Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pp 986–990

  47. Tseng H, Jan R, Yang W (2009) A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE International Conference on Communications (ICC’09), 1–6

  48. Turkanovic M, Brumen B, Holbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112

    Article  Google Scholar 

  49. Wang Y (2012) Password protected smart card and memory stick authentication against off-line dictionary attacks. In: IFIP international information security conference. Springer, Berlin, pp 489–500

  50. Wang X, Gao Y (2010) A switch-modulated method for chaos digital secure communication based on user-defined protocol. Commun Nonlinear Sci Numer Simul 15(1):99–104

    Article  Google Scholar 

  51. Wang X, Wang S, Wang Z, Zhang M (2016) A new key agreement protocol based on chebyshev chaotic maps. Secur Commun Netw 9(18):5028–5035

    Article  Google Scholar 

  52. Wang X, Zhang D, Guo X (2013) Authentication and recovery of images using standard deviation. J Electron Imaging 22(3):033012–033012

    Article  Google Scholar 

  53. Wang X, Zhao J (2010) An improved key agreement protocol based on chaos. Commun Nonlinear Sci Numer Simul 15(12):4052–4057

    Article  MathSciNet  MATH  Google Scholar 

  54. Watro RJ, Kong D, Cuti SF, Gardiner C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: ACM workshop on security of Ad Hoc and sensor networks, pp 59–64

  55. Wong KHM, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, pp 1–8

  56. Xingyuan W, Dapeng L (2013) A secure key agreement protocol based on chaotic maps. Chinese Physics B 22(11):110503

    Article  Google Scholar 

  57. Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yulei Chen.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, Y., Chen, J. Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks. Multimed Tools Appl 80, 15291–15313 (2021). https://doi.org/10.1007/s11042-020-10259-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10259-z

Keywords

Navigation