Skip to main content
Log in

Chaotic map based multi-factor authentication protocol for underwater environment monitoring

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The underwater environment holds significant potential for advancing ecosystem understanding, industrial operations, and early natural disaster prediction. To monitor this environment effectively, technologies like Underwater Wireless Sensor Networks (UWSNs) are being extensively developed and deployed. However, due to the unreliable nature of the underwater environment, communications carried out using UWSNs are vulnerable to various security threats. For secure communication in UWSNs, it is essential that the communicating entities are mutually authenticated. Recently, Sureshkumar et al. discussed an authentication protocol using chaotic map operations. However, we have discovered that the protocol is not secure against privileged insider, user impersonation, and denial of service attacks. Additionally, the protocol lacks perfect forward secrecy. To address these issues, we propose a multi-factor authentication protocol based on the chaotic map for monitoring the underwater environment. The extensive formal security analysis employs the Burrows-Abadi-Needham (BAN) logic and Real-Or-Random (ROR) model to prove the robustness of our proposed protocol. Furthermore, a state-of-the-art informal security analysis demonstrates the effectiveness of our protocol against various threats. We also validate the security of our proposed protocol through simulations using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. In terms of performance evaluation, our protocol outperforms existing ones ensuring proficient operation in the underwater environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Availability of supporting data

Not Applicable.

References

  1. Sureshkumar V, Amin R, Obaidat MS, Karthikeyan I (2020) An enhanced mutual authentication and key establishment protocol for tmis using chaotic map. Journal of Information Security and Applications 53:102,539

    Article  Google Scholar 

  2. Galindo D, Roman R, Lopez J (2008) In: International Conference on Cryptology and Network Security (Springer), pp 120–132

  3. Cong Y, Yang G, Wei Z, Zhou W (2010) In: 2010 International Conference on Communications and Mobile Computing, vol 1 (IEEE), pp 162–168

  4. Domingo MC (2011) Securing underwater wireless communication networks. IEEE Wireless Communications 18(1):22–28

    Article  Google Scholar 

  5. Lloret J (2013) Underwater sensor nodes and networks

  6. Ahmed MR, Aseeri M, Kaiser MS, Zenia NZ, Chowdhury ZI (2015) In: 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT) (IEEE), pp 1–6

  7. Capossele A, Petrioli C, Saturni G, Spaccini D, Venturi D (2017) In: Proceedings of the International Conference on Underwater Networks & Systems, pp 1–5

  8. Zhao Y, Tian B, Chen Z, Liu Y, Ding J (2018) In: IT Convergence and Security 2017 (Springer), pp 146–158

  9. Ryecroft SP, Shaw A, Fergus P, Kot P, Muradov M, Moody A, Conroy L (2018) In: 2018 11th International Conference on Developments in ESystems Engineering (DeSE) (IEEE), pp 95–99

  10. Yang G, Dai L, Si G, Wang S, Wang S (2019) Challenges and security issues in underwater wireless sensor networks. Procedia Comput Sci 147:210–216

    Article  Google Scholar 

  11. Yazdinejad A, Parizi RM, Srivastava G, Dehghantanha A, Choo KKR (2019) In: 2019 IEEE Globecom Workshops (GC Wkshps) (IEEE), pp 1–6

  12. Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2):1–7

    Article  Google Scholar 

  13. Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2):1–8

    Article  Google Scholar 

  14. Islam SH (2015) Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inform Sci 312:104–130

    Article  MathSciNet  Google Scholar 

  15. Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur Commun Netw 9(15):2643–2655

    Article  Google Scholar 

  16. Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gene Comput Syst 63:56–75

    Article  Google Scholar 

  17. Gao G, Peng X, Tian Y, Qin Z (2016) A chaotic maps-based authentication scheme for wireless body area networks. Int J Distrib Sens Netw 12(7):2174,720

    Article  Google Scholar 

  18. Li X, Wu F, Khan MK, Xu L, Shen J, Jo M (2018) A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gene Comput Syst 84:149–159

    Article  ADS  Google Scholar 

  19. Canetti R, Krawczyk H (2001) In: International conference on the theory and applications of cryptographic techniques (Springer), pp 453–474

  20. Canetti R, Krawczyk H (2002) In: International Conference on the Theory and Applications of Cryptographic Techniques (Springer), pp 337–351

  21. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198–208

    Article  MathSciNet  Google Scholar 

  22. Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154

    Article  Google Scholar 

  23. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552

    Article  MathSciNet  Google Scholar 

  24. Kumar A, Om H (2021) In: Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems (Springer), pp 921–929

  25. Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Dependable Secure Comput 17(6):1133–1146

    Article  Google Scholar 

  26. Guo XY, Sun DZ, Yang Y (2020) An improved three-factor session initiation protocol using chebyshev chaotic map. IEEE Access 8:111,265-111,277

    Article  Google Scholar 

  27. Vemishetty N, Patra P, Jha PK, Chivukula KB, Vala CK, Jagirdar A, Gudur VY, Acharyya A, Dutta A (2016) Low power personalized ecg based system design methodology for remote cardiac health monitoring. IEEE Access 4:8407–8417

    Article  Google Scholar 

  28. ADC-Converter-Basics (2011) (accessed August 10, 2020). https://www.slideshare.net/hacker1500/adc-converter-basics

  29. Al-Hussain A, Al-Rassan I (2010) In: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, pp 447–452

  30. Althobaiti O, Al-Rodhaan M, Al-Dhelaan A (2013) An efficient biometric authentication protocol for wireless sensor networks. International Journal of Distributed Sensor Networks 9(5):407,971

    Article  Google Scholar 

  31. Salem MB, Hershkop S, Stolfo SJ (2008) In: Insider Attack and Cyber Security (Springer), pp 69–90

  32. Ku WC, Chang ST (2005) Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Trans Commun 88(5):2165–2167

    Article  Google Scholar 

  33. Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tool Appl 78(11):15255–15273

    Article  Google Scholar 

  34. Liu H (2010) In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pp 65–76

  35. Bae W, Kwak J (2020) Smart card-based secure authentication protocol in multi-server iot environment. Multimed Tool Appl 79(23):15793–15811

    Article  Google Scholar 

  36. Nayak CS, et al (2020) An improved user authentication scheme for electronic medical record systems. Multimed Tool Appl 79

  37. Rehman HU, Ghani A, Chaudhry SA, Alsharif MH, Nabipour N (2021) A secure and improved multi server authentication protocol using fuzzy commitment. Multimed Tool Appl 80(11):16907–16931

    Article  Google Scholar 

  38. Alsalhi IN, Albermany SA, Authentication of crns by using ban logic

  39. Boyd C, Mao W (1993) In: Workshop on the Theory and Application of Cryptographic Techniques (Springer), pp 240–247

  40. Wessels J, BV CF (2001) Application of ban-logic. CMG FINANCE BV 19:1–23

    Google Scholar 

  41. Cohen M, Dam M (2005) In: Methods for modalities, vol 4

  42. Qi M, Chen J (2019) Anonymous biometrics-based authentication with key agreement scheme for multi-server environment using ecc. Multimed Tool Appl 78(19):27553–27568

    Article  Google Scholar 

  43. Abdalla M, Chevassut O, Fouque PA, Pointcheval D (2005) In: International Conference on the Theory and Application of Cryptology and Information Security (Springer), pp 566–584

  44. Abdalla M, Fouque PA, Pointcheval D (2006) Password-based authenticated key exchange in the three-party setting. IEE Proc-Inform Secur 153(1):27–39

    Article  Google Scholar 

  45. Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam PC, Kouchnarenko O, Mantovani J, et al (2005) In: International conference on computer aided verification (Springer), pp 281–285

  46. Dhillon PK, Kalra S (2019) Secure and efficient ecc based sip authentication scheme for voip communications in internet of things. Multimed Tool Appl 78(16):22199–22222

    Article  Google Scholar 

  47. Sasikaladevi N, Malathi D (2019) Privacy preserving light weight authentication protocol (leap) for wban by exploring genus-2 hec. Multimed Tool Appl 78(13):18037–18054

    Article  Google Scholar 

  48. Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur Commun Netw 9(13):2070–2092

    Article  Google Scholar 

  49. Shnayder V, Hempstead M, Chen B, Allen GW, Welsh M (2004) In: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp 188–200

Download references

Acknowledgements

All authors declare that they have no acknowledgments to mention.

Funding

Not Applicable

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed towards the study of the topic. The work was carried out under the supervision of Dr. Hari Om. The first draft of the manuscript was written by Miss Diksha Rangwani and all the authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Diksha Rangwani.

Ethics declarations

Competing interests

All the authors declare that they have no competing interests to declare for this manuscript.

Ethical Approval and Consent to participate

All the authors declare that they adhered to the ethics of research and publication and they are willing to participate in the process of review and publication.

Human and Animal Ethics

Not Applicable.

Consent for publication

All the authors give the consent for publication willingly.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rangwani, D., Om, H. Chaotic map based multi-factor authentication protocol for underwater environment monitoring. Multimed Tools Appl 83, 26871–26900 (2024). https://doi.org/10.1007/s11042-023-16608-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16608-y

Keywords