Abstract
Securely accessing the information from sensor nodes is the premier need and becomes the challenging area in wireless sensor networks (WSNs) and internet of things environment (IoT). Consequently, keeping up the protection of shared information, authentication assumes a vital role. Where after the mutual authentication, it makes the agreement of the session key among the participants. In this regard, Kalra et al.’s proposed a mechanism for client authentication and session key agreement, and guaranteed, their scheme is highly secured against many possible and well-known threats. However, in this paper, it has been demonstrated that their scheme can suffer from sensor node capturing attack, leakage of gateway node’s secret key and also impractical for session key agreement. Further, an improved scheme has been proposed to conquer the security flaws of Kalra et al.’s scheme. In addition, to check the security properties and to prove the mutual authentication among the participant, the proposed scheme has been verified by ProVerif protocol verification tools. Finally, a comparative study with the other related schemes has also been defined to prove the efficiency of the proposed scheme.












Similar content being viewed by others
References
Wong, K. H. M., Zheng, Y., Cao. J., & Wang, S. (2006). A dynamic user authentication scheme for wireless sensor networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (vol. 1, p. 8).
Watro, R., Kong, D., Cuti, S.-F., Gardiner, C., Lynn, C., & Kruus, P. (2004). TinyPK: securing sensor networks with public key technology. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (pp. 59–64).
Cheng, H., Geng, Y., Wang, J., & Huang, X. (2006). An authenticated identity-based key establishment and encryption scheme for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 13(2), 31–38.
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors, 10(3), 2450–2459.
Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.
Ruan, Z., Sun, X., & Liang, W. (2013). Securing sensor data storage and query based on k-out-of-n coding. International Journal of Communication Systems, 26(5), 549–566.
Turkanović, M., Brumen, B., & Hölbl, M. (2014). A novel user authenticnation and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks, 20, 96–112.
Kalra, S., & Sood, S. K. (2015). Advanced password-based authentication scheme for wireless sensor networks. Journal of Information Security and Applications, 20, 37–46.
Chuang, M. C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.
Li, C. T., Lee, C. C., Chen, H. H., Syu, M. J., & Wang, C. C. (2015).Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. In International Conference on Information Networking (ICOIN) (pp. 498–502).
Farash, M. S., Turkanović, M., Kumari, S., & Hölbl, M. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks, 36, 152–176.
Amin, R., & Biswas, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58–80.
Lin, Y., Wang, K., Zhang, B., Liu, Y., & Li, X. (2016). An enhanced biometric-based three factors user authentication scheme for multi-server environments. International Journal of Security and its Applications, 10(1), 315–328.
Challa, S., Das, A. K., Odelu, V., Kumar, N., Kumari, S., Khan, M. K., & Vasilakos, A. V. (2018). An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers & Electrical Engineering, 69, 534–554.
Barman, S., Das, A. K., Samanta, D., Chattopadhyay, S., Rodrigues, J. J., & Park, Y. (2018). “Provably secure multi-server authentication protocol using fuzzy commitment. Institute of Electrical and Electronics Engineers (IEEE) Access, 6, 38578–38594.
Sharif, A. O., Arshad, H., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Generation Computer Systems, 100, 882–892.
Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Leng, L., & Kumar, N. (2016). Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Computer Networks, 101, 42–62.
Koya, A. M., & Deepthi, P. P. (2018). Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Computer Networks, 140, 138–151.
Li, X., Ibrahim, M. H., Kumari, S., Sangaiah, A. K., Gupta, V., & Choo, K. K. R. (2017). Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer Networks, 129, 429–443.
Gupta, A., Tripathi, M., & Sharma, A. (2020). A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN. Computer Communications, 160, 311–325.
Fan, W., Xu, L., Kumari, S., & Li, X. (2015). A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks. Computers & Electrical Engineering, 45, 274–285.
Palash, S. (2010). A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security (TISSEC), 13(4), 33.
Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transaction on Computers, 51(5), 541–552.
Kocher, P., Joshua, J., & Jun, B. (1999). Differential power analysis. Annual International Cryptology Conference, 1666, 388–397.
Jokhio, S. H., Jokhio, I. A., & Kemp, A. H. (2012). Node capture attack detection and defence in wireless sensor networks. IET Wireless Sensor Systems, 2(3), 161–169.
Blanchet, B. (2001). An efficient cryptographic protocol verifier based on prolog rules. In IEEE csfw (pp.82–96).
Abadi, M., Blanchet, B., & Hubert, C. L. (2009). Models and proofs of protocol security: A progress report. In International Conference on Computer Aided Verification (pp. 35–49). Berlin, Heidelberg: Springer.
Abadi, M., & Fournet, C. (2001). Mobile values, new names, and secure communication. In ACM Sigplan Notices (vol. 36, no. 3, pp. 104–115).
He, D., Gao, Y., Chan, S., Chen, Ch., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 10(4), 361–371.
Song, R. (2010). Advanced smart card based password authentication protocol. Computer Standards & Interfaces, 32(5–6), 321–325.
Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, H. W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779.
Chen, T. H., & Shih, W. K. (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chunka, C., Banerjee, S. & Goswami, R.S. An Efficient User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card. Wireless Pers Commun 117, 1361–1385 (2021). https://doi.org/10.1007/s11277-020-07926-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07926-7