Abstract
The underwater environment holds significant potential for advancing ecosystem understanding, industrial operations, and early natural disaster prediction. To monitor this environment effectively, technologies like Underwater Wireless Sensor Networks (UWSNs) are being extensively developed and deployed. However, due to the unreliable nature of the underwater environment, communications carried out using UWSNs are vulnerable to various security threats. For secure communication in UWSNs, it is essential that the communicating entities are mutually authenticated. Recently, Sureshkumar et al. discussed an authentication protocol using chaotic map operations. However, we have discovered that the protocol is not secure against privileged insider, user impersonation, and denial of service attacks. Additionally, the protocol lacks perfect forward secrecy. To address these issues, we propose a multi-factor authentication protocol based on the chaotic map for monitoring the underwater environment. The extensive formal security analysis employs the Burrows-Abadi-Needham (BAN) logic and Real-Or-Random (ROR) model to prove the robustness of our proposed protocol. Furthermore, a state-of-the-art informal security analysis demonstrates the effectiveness of our protocol against various threats. We also validate the security of our proposed protocol through simulations using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. In terms of performance evaluation, our protocol outperforms existing ones ensuring proficient operation in the underwater environment.









Similar content being viewed by others
Availability of supporting data
Not Applicable.
References
Sureshkumar V, Amin R, Obaidat MS, Karthikeyan I (2020) An enhanced mutual authentication and key establishment protocol for tmis using chaotic map. Journal of Information Security and Applications 53:102,539
Galindo D, Roman R, Lopez J (2008) In: International Conference on Cryptology and Network Security (Springer), pp 120–132
Cong Y, Yang G, Wei Z, Zhou W (2010) In: 2010 International Conference on Communications and Mobile Computing, vol 1 (IEEE), pp 162–168
Domingo MC (2011) Securing underwater wireless communication networks. IEEE Wireless Communications 18(1):22–28
Lloret J (2013) Underwater sensor nodes and networks
Ahmed MR, Aseeri M, Kaiser MS, Zenia NZ, Chowdhury ZI (2015) In: 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT) (IEEE), pp 1–6
Capossele A, Petrioli C, Saturni G, Spaccini D, Venturi D (2017) In: Proceedings of the International Conference on Underwater Networks & Systems, pp 1–5
Zhao Y, Tian B, Chen Z, Liu Y, Ding J (2018) In: IT Convergence and Security 2017 (Springer), pp 146–158
Ryecroft SP, Shaw A, Fergus P, Kot P, Muradov M, Moody A, Conroy L (2018) In: 2018 11th International Conference on Developments in ESystems Engineering (DeSE) (IEEE), pp 95–99
Yang G, Dai L, Si G, Wang S, Wang S (2019) Challenges and security issues in underwater wireless sensor networks. Procedia Comput Sci 147:210–216
Yazdinejad A, Parizi RM, Srivastava G, Dehghantanha A, Choo KKR (2019) In: 2019 IEEE Globecom Workshops (GC Wkshps) (IEEE), pp 1–6
Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2):1–7
Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2):1–8
Islam SH (2015) Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inform Sci 312:104–130
Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur Commun Netw 9(15):2643–2655
Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gene Comput Syst 63:56–75
Gao G, Peng X, Tian Y, Qin Z (2016) A chaotic maps-based authentication scheme for wireless body area networks. Int J Distrib Sens Netw 12(7):2174,720
Li X, Wu F, Khan MK, Xu L, Shen J, Jo M (2018) A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gene Comput Syst 84:149–159
Canetti R, Krawczyk H (2001) In: International conference on the theory and applications of cryptographic techniques (Springer), pp 453–474
Canetti R, Krawczyk H (2002) In: International Conference on the Theory and Applications of Cryptographic Techniques (Springer), pp 337–351
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198–208
Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
Kumar A, Om H (2021) In: Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems (Springer), pp 921–929
Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Dependable Secure Comput 17(6):1133–1146
Guo XY, Sun DZ, Yang Y (2020) An improved three-factor session initiation protocol using chebyshev chaotic map. IEEE Access 8:111,265-111,277
Vemishetty N, Patra P, Jha PK, Chivukula KB, Vala CK, Jagirdar A, Gudur VY, Acharyya A, Dutta A (2016) Low power personalized ecg based system design methodology for remote cardiac health monitoring. IEEE Access 4:8407–8417
ADC-Converter-Basics (2011) (accessed August 10, 2020). https://www.slideshare.net/hacker1500/adc-converter-basics
Al-Hussain A, Al-Rassan I (2010) In: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, pp 447–452
Althobaiti O, Al-Rodhaan M, Al-Dhelaan A (2013) An efficient biometric authentication protocol for wireless sensor networks. International Journal of Distributed Sensor Networks 9(5):407,971
Salem MB, Hershkop S, Stolfo SJ (2008) In: Insider Attack and Cyber Security (Springer), pp 69–90
Ku WC, Chang ST (2005) Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Trans Commun 88(5):2165–2167
Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tool Appl 78(11):15255–15273
Liu H (2010) In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pp 65–76
Bae W, Kwak J (2020) Smart card-based secure authentication protocol in multi-server iot environment. Multimed Tool Appl 79(23):15793–15811
Nayak CS, et al (2020) An improved user authentication scheme for electronic medical record systems. Multimed Tool Appl 79
Rehman HU, Ghani A, Chaudhry SA, Alsharif MH, Nabipour N (2021) A secure and improved multi server authentication protocol using fuzzy commitment. Multimed Tool Appl 80(11):16907–16931
Alsalhi IN, Albermany SA, Authentication of crns by using ban logic
Boyd C, Mao W (1993) In: Workshop on the Theory and Application of Cryptographic Techniques (Springer), pp 240–247
Wessels J, BV CF (2001) Application of ban-logic. CMG FINANCE BV 19:1–23
Cohen M, Dam M (2005) In: Methods for modalities, vol 4
Qi M, Chen J (2019) Anonymous biometrics-based authentication with key agreement scheme for multi-server environment using ecc. Multimed Tool Appl 78(19):27553–27568
Abdalla M, Chevassut O, Fouque PA, Pointcheval D (2005) In: International Conference on the Theory and Application of Cryptology and Information Security (Springer), pp 566–584
Abdalla M, Fouque PA, Pointcheval D (2006) Password-based authenticated key exchange in the three-party setting. IEE Proc-Inform Secur 153(1):27–39
Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam PC, Kouchnarenko O, Mantovani J, et al (2005) In: International conference on computer aided verification (Springer), pp 281–285
Dhillon PK, Kalra S (2019) Secure and efficient ecc based sip authentication scheme for voip communications in internet of things. Multimed Tool Appl 78(16):22199–22222
Sasikaladevi N, Malathi D (2019) Privacy preserving light weight authentication protocol (leap) for wban by exploring genus-2 hec. Multimed Tool Appl 78(13):18037–18054
Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur Commun Netw 9(13):2070–2092
Shnayder V, Hempstead M, Chen B, Allen GW, Welsh M (2004) In: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp 188–200
Acknowledgements
All authors declare that they have no acknowledgments to mention.
Funding
Not Applicable
Author information
Authors and Affiliations
Contributions
All authors contributed towards the study of the topic. The work was carried out under the supervision of Dr. Hari Om. The first draft of the manuscript was written by Miss Diksha Rangwani and all the authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
All the authors declare that they have no competing interests to declare for this manuscript.
Ethical Approval and Consent to participate
All the authors declare that they adhered to the ethics of research and publication and they are willing to participate in the process of review and publication.
Human and Animal Ethics
Not Applicable.
Consent for publication
All the authors give the consent for publication willingly.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rangwani, D., Om, H. Chaotic map based multi-factor authentication protocol for underwater environment monitoring. Multimed Tools Appl 83, 26871–26900 (2024). https://doi.org/10.1007/s11042-023-16608-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16608-y