An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks

https://doi.org/10.1016/j.jnca.2017.12.012Get rights and content

Highlights

  • An untraceable and anonymous password authentication protocol.

  • Robust authentication scheme for heterogeneous wireless sensor networks.

  • Low-power sensor nodes for heterogeneous wireless sensor networks.

  • Protocol verification using AVISPA.

Abstract

Ensuring secure access to sensitive information in a wireless sensor networks (WSNs) remains a topic of ongoing research challenge, partly due to the wide range of potential attacks and attack vectors. In this paper, we reveal a previously unpublished vulnerability in the authentication scheme for ad hoc WSN of Chang et al.'s. Specifically, we reveal that the authentication phase of the scheme does not defend against various known attacks. We then propose a robust authentication scheme for WSNs, designed to provide security against known active and passive attacks. We then evaluate the performance of the proposed scheme using AVISPA.

Introduction

Wireless sensor networks (WSNs) typically consist of a large number of sensor nodes whose storage capacity and computing power can be fairly limited (i.e. resource constrained). Generally, these sensor nodes are placed in unattended places under the control of one or more sink/gateway nodes. Multiple sink or gateway nodes are generally used to provide a larger coverage area. Applications of WSNs include environmental monitoring, agriculture, health care, military application, disaster management, domestic and surveillance systems (Akyildiz et al., 2002), and sensor nodes include micro-controller, transceiver, external memory, analog to digital converter and power source. For example, the sensor node MICA consists of a micro-controller (Atmel ATmega 128 L, 8  MHz at 8 MIPS), a transceiver (RFM TR1000 radio 50 kbit/s), some data memory (180 + 4 kB RAM), and some external memory (512 kB Flash), and supports tiny operating system (OS). Upon request, the sensor node gathers relevant information, and processes the information prior to transmitting to the target entity such as a gateway node. The sensor network may be (i) homogenous (i.e. all nodes have the same low-power and low-storage capability), or (ii) heterogeneous (i.e. nodes vary in terms of power and storage capabilities). In this paper, we focus on heterogeneous WSNs as such networks will be harder to secure due to the diversity of configurations, etc.

In heterogeneous WSNs, information (including sensitive information) is transmitted from sensor nodes to other entity(ies) via a public channel. Such a channel can be vulnerable to attacks such as interception, insertion, deletion, and re-routing of messages. Therefore, provide secure data communication in such a setting is an active research area. One “classical” solution is user authentication and session key agreement scheme (Choo, 2009, Choo et al., 2014).

One operational challenge in enforcing security measures (e.g. user authentication and session key agreement schemes) in WSNs is the difficulty in the recharging or replacing of battery for deployed sensor nodes. Thus, when designing security measures for WSNs, one should ideally reduce the energy consumption required of the sensor node. As explained in (Chandrakasan and Heinzelman, 2000), Equations (1), (2) can be used to respectively measure the energy consumption for the transmission and receiving of messages of l-bits over a distance (d). Here, the free space model (fs) is used when (d) is less than a threshold value d0; otherwise, the multi-path (mp) model is used.ET(l,d)=lEelec+lεfsd2ford<d0lEelec+lεmpd4fordd0ER(l)=lEelec

In the above equations, Eelec denotes the energy required by the electronic circuit, and εfs and εmp the energy required by the amplifier in free space and multi-path model, respectively.

Remark 0

Unsurprisingly, we observe that the sensor node consumes power to transmit and receive message of l-bits. Since consumption is directly proportional to the distance between the sensor nodes and the target entity (see Equation (3)), the minimum distance should be maintained to reduce power consumption between the entities. It is known that the gateway node has higher energy resources as well as more computing capabilities compared to the normal sensor nodes in WSNs. We denote the power consumption as Pconsume and distance between the entity as Ddist, and the equation can be defined as follows (Xu et al., 2010).Pconsume1Ddist

Turkanovi et al. (2014), Farash et al. (2016) and Chang and Le, (2016) proposed three authentication protocols based on the architecture described in Fig. 1. However, as the proposed protocols in (Chang and Le, 2016, Farash et al., 2016, Turkanovi et al., 2014) are designed to work in a network model with characteristics different from a WSN (e.g. the need for reduced energy consumption in deployed sensor nodes), these protocols are not suitable for WSN deployment. In (Chang and Le, 2016, Farash et al., 2016, Turkanovi et al., 2014), for example, a user directly interacts over a long distance with the sensor node and vice-versa. As pointed out in (Amin and Biswas, 2016), power consumption is directly proportional to the distance between user and sensor node. In addition, a sensor node consumes more power to transmit a message in comparison to receiving the same message. Hence, a longer distance implies more power consumption required at the sensor nodes.

Thus, in this paper, we present a modified architecture (see Fig. 2), where a user accesses (sensitive) data collected from the sensor node via a gateway node. Since the sensor nodes communicate only with the nearby gateway node, the power consumption for data communication will be significantly reduced, in comparison to existing approaches of (Chang and Le, 2016, Farash et al., 2016, Turkanovi et al., 2014).

In the literature, there have been a large number of proposed smartcard-based session key agreement protocols (Kumari et al., 2015). In 2011, for example, Das et al. (2012) and Xue et al. (2013) presented two smardcard-based user authentication and key agreement protocols for WSNs. However, it was subsequently pointed out that the protocol in (Das et al., 2012) is flawed and improved versions were proposed (Xu and Wang, 2013, Turkanovic and Holbl, 2013). Li et al. (2013), and Turkanovic and Holbl (2013) also revealed vulnerabilities in the work of Xue et al. (2013). In 2014, Turkanovic et al. (2014) presented a new user authentication and session key agreement protocol for heterogeneous WSNs using smartcard and hash function. The proposed protocol was designed to achieve lower computation cost and energy consumption, while providing user anonymity, mutual authentication and other relevant security properties in an Internet of Things (IoT) deployment. However, Ruhul et al. (Amin and Biswas, 2016) and Farash et al. demonstrated that the protocol in (Turkanovi et al., 2014) suffers from a number of security vulnerabilities and presented two improved protocols. Similarly, Chang and Le, (2016) revealed a number of vulnerabilities in the protocol of (Turkanovi et al., 2014) and presented an improved solution. However, in this paper, we reveal previously unknown security weaknesses in the protocol of Chang and Le, (2016).

We regard the contributions of this paper to be as follows:

  • (i)

    We reveal that the protocol of Chang and Le, (2016) is insecure against common security properties such as-off-line password guessing attack with smartcard loss, user untraceability attack, smartcard recovery attack, known session specific temporary information attack, and previous session key attack. We also demonstrate that the design of the protocol's authentication phase is flawed.

  • (ii)

    We present a more realistic architecture for WSN (see Fig. 2), and a robust lightweight hash function authentication technique using smartcards for secure data transmission in WSNs.

We then demonstrate the security of the proposed protocol using the AVISPA tool, and evaluate the performance of the protocol.

The rest of the paper is organized as follows. In Sections 2 Revisiting Chang et al.’s protocol (, 3 Security vulnerabilities in Chang et al.’s protocol, we revisit Chang et al.’s protocol (Chang and Le, 2016) and reveal the security vulnerabilities, respectively. We outline our proposed protocol in Section 4. We then present the protocol's security verification using AVISPA in Section 5 and security analysis in Section 6. Performance evaluation is presented in Section 7. The paper is concluded in Section 8.

Section snippets

Revisiting Chang et al.’s protocol (Chang and Le, 2016)

The protocol in (Chang and Le, 2016) has the following phases: pre-deployment phase, user registration phase, authentication phase and password change phase. There are also two versions of the protocol, namely: a lightweight protocol that does not guarantee perfect forward secrecy, and a “normal” protocol based on ECC that provides perfect forward secrecy. In this paper, we only study the lightweight protocol.

Security vulnerabilities in Chang et al.’s protocol

We now present the security vulnerabilities in the protocol of Chang and Le, (2016). In our attack, we assume the following:

Definition 1

ADV (adversary) has the capability to retrieve smartcard information as discussed in (Kocher et al., 1999, Messerges et al., 2002). For instance, if ADV obtains the smartcard, ADV can trivially extract all information from the smartcard.

Definition 2

All messages produced by the protocol are transmitted through an unreliable channel; thus, ADV can intercept, delete, modify, re-route,

Proposed protocol

This section presents an improved protocol to mitigate the vulnerabilities in (Chang and Le, 2016). The notations used in the rest of this paper are outlined in Table 1. The proposed protocol consists of the pre-deployment phase, user registration phase, login phase, authentication and key agreement phase, password update phase, biometric update phase and password recovery phase.

Protocol simulation using AVISPA tool

In this section, we simulate the proposed protocol using the AVISPA tool, a widely formal security verification tool. Using the tool, one is able to determine whether the protocol is SAFE or UNSAFE. We refer interested reader to (Amin and Biswas, 2016, Armando et al., 2005, Dolev and Yao, 1983) for more information about HLPSL specifications and the AVISPA tool.

Security analysis

Proposition 1

The proposed protocol is secure against smartcard stolen attacks.

Proof. In this attack, ADV seeks to obtain confidential information using information that could be recovered from the smartcard (Kocher et al., 1999, Messerges et al., 2002). As mentioned in Definition 3, the identity and password of Ui can be trivially obtained. Hence, ADV seeks to derive IDi,PWi of Ui along with secret information of GWN and Sj.

  • (1)

    ADV obtains MIi,Ci,Ai,GEN(),REP(),h(), where MIi=h(IDiri) (ψi,θi)=GEN(Bi), Ai=h(

Performance evaluation and comparison

In this section, we present a comparative summary of the proposed protocol other existing schemes, in terms of security features (see Table 2), computation costs (see Table 3), and storage and communication costs (see Table 4).

As summarized in Table 2, the protocols in (Yeh et al., 2011, Turkanovic and Holbl, 2013, Das et al., 2012, Xue et al., 2013, Turkanovi et al., 2014, Chang and Le, 2016) are insecure. Although the protocol in (Amin and Biswas, 2016) is secure, it is not suitable for

Conclusion

In this paper, we revisited the protocol of Chang et al. and revealed previously unpublished vulnerabilities. We also presented a more realistic architecture for WSNs deployment which has low-power sensor nodes. We then proposed a new protocol to overcome the security pitfalls of Chang et al.’s protocol, and demonstrated the security of the proposed protocol using AVISPA simulation tool and security arguments. In our comparative summary, we demonstrated that the proposed protocol incurs lower

Acknowledgments

The authors thank the editor and three anonymous reviewers for their critique and invaluable feedback. The corresponding author is supported by the cloud technology endowed professorship.

Ruhul Amin received Ph.D in Computer Science and Engineering from the Indian Institute of Technology(ISM) Dhanbad, Jharkhand, India, in 2017. He also received B.Tech and M.Tech both in Computer Science and Engineering from Maulana Abul Kalam Azad University of Technology, West Bengal, India in 2009 and 2013, respectively. Presently, he is working as an Assistant Professor in the Department of Computer Science and Engineering, Dr. Shyama Prasad Mukherjee International Institute of Information

References (24)

  • P. Chandrakasan et al.

    Application-specific protocol architectures for wireless networks

  • C.-C. Chang et al.

    A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks

    IEEE Trans. Wireless Commun.

    (2016)
  • Cited by (67)

    • Multi-factor based session secret key agreement for the Industrial Internet of Things

      2023, Ad Hoc Networks
      Citation Excerpt :

      The adversary can make an educated guess about the user’s identity and password. In the case where the user does not use a simple password or username, the adversary guesses the user’s password and identity, and verifies his guess in polynomial time, from computationally speaking, it is difficult for an adversary to complete [35]. We also need to consider security threats from IoT devices.

    • A lightweight three factor authentication framework for IoT based critical applications

      2022, Journal of King Saud University - Computer and Information Sciences
    • A robust authentication scheme for remote diagnosis and maintenance in 5G V2N

      2022, Journal of Network and Computer Applications
      Citation Excerpt :

      Additionally, in the authentication process of this scheme, any legitimate user can acknowledge the long-term secret key of the sensor node and any sensor node is able to obtain the long-term secret key of the user, which seems insecure. Amin et al. (2018) provided an untraceable and anonymous three-factor authentication scheme for heterogeneous wireless sensor networks and claimed that their scheme is efficient and can resist common protocol attacks. However, Aghili et al. (2018) have shown that this scheme cannot resist user impersonation, de-synchronization and traceability attacks.

    View all citing articles on Scopus

    Ruhul Amin received Ph.D in Computer Science and Engineering from the Indian Institute of Technology(ISM) Dhanbad, Jharkhand, India, in 2017. He also received B.Tech and M.Tech both in Computer Science and Engineering from Maulana Abul Kalam Azad University of Technology, West Bengal, India in 2009 and 2013, respectively. Presently, he is working as an Assistant Professor in the Department of Computer Science and Engineering, Dr. Shyama Prasad Mukherjee International Institute of Information Technology, Naya Raipur, India. His research interest includes authentication protocol and security in WSNs.

    SK Hafizul Islam received M.Sc. in Applied Mathematics from the Vidyasagar University, West Bengal, India in 2006. He also received M.Tech. degree in Computer Application in 2009, and Ph.D. degree in Computer Science and Engineering in June 2013 from the Indian Institute of Technology(ISM) Dhanbad, Jharkhand, India, under the INSPIRE Fellowship Ph.D. Program (funded by DST, Govt. of India). He is currently an Assistant Professor with the Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani (IIIT Kalyani), West Bengal India. Before joining the IIIT Kalyani, he worked as an Assistant Professor in the Department of Computer Science and Information Systems, BITS Pilani, Pilani Campus, Rajasthan, India. He received University Gold Medal, S.D. Singha Memorial Endowment Gold Medal and Sabitri Parya Memorial Endowment Gold Medal from Vidyasagar University, in 2006. He also received University Gold Medal from IIT(ISM) Dhanbad in 2009 and OPERA award from BITS Pilani in 2015. He has more than 5 yrs of teaching and 8 yrs of research experiences, and published seventy research papers in Journals and Conference Proceedings of International reputes. He served as reviewer in many reputed International Journals and Conferences. He is an Associate Editor of Wiley's the International Journal of Communication System and Security and Privacy. His current research interest includes Cryptography, Information security, WSNs, IoT and Cloud Computing.

    Neeraj Kumar received his Ph.D. in Computer Science and Engineering from Shri Mata Vaishno Devi University, Katra, India. He is now an Associate Professor in the Department of Computer Science and Engineering, Thapar University, Patiala, Punjab (India). He is a member of IEEE. His research is focused on mobile computing, parallel/distributed computing, multi-agent systems, service oriented computing, routing and security issues in mobile ad hoc, sensor and mesh networks. He has more than 100 technical research papers in leading journals such as-IEEE TII, IEEE TIE, IEEE TDSC, IEEE ITS, IEEE TWPS, IEEE SJ,IEEE ComMag, IEEE WCMag, IEEE NetMag and conferences. His research is supported from DST, TCS and UGC. He has guided many students leading to M.E. and Ph.D.

    Kim-Kwang Raymond Choo received the Ph.D. in Information Security in 2006 from Queensland University of Technology, Australia. He currently holds the Cloud Technology Endowed Professorship at The University of Texas at San Antonio, and an adjunct associate professorship at the University of South Australia. He serves on the editorial board of Computers & Electrical Engineering, Cluster Computing, Digital Investigation, IEEE Access, IEEE Cloud Computing, IEEE Communications Magazine, Future Generation Computer Systems, Journal of Network and Computer Applications, PLoS ONE, Soft Computing, etc. He also serves as the Special Issue Guest Editor of ACM Transactions on Embedded Computing Systems (2017), ACM Transactions on Internet Technology (2016), Computers and Electrical Engineering (2017), Digital Investigation (2016), Future Generation Computer Systems (2016, 2018), IEEE Cloud Computing (2015), IEEE Network (2016), IEEE Transactions on Cloud Computing (2017), IEEE Transactions on Dependable and Secure Computing (2017), Journal of Computer and System Sciences (2017), Multimedia Tools and Applications (2017), Personal and Ubiquitous Computing (2017), Pervasive and Mobile Computing (2016), Wireless Personal Communications (2017), etc. In 2016, he was named the Cybersecurity Educator of the Year – APAC (Cybersecurity Excellence Awards are produced in cooperation with the Information Security Community on LinkedIn), and in 2015 he and his team won the Digital Forensics Research Challenge organized by Germany's University of Erlangen-Nuremberg. He is the recipient of ESORICS 2015 Best Paper Award, 2014 Highly Commended Award by the Australia New Zealand Policing Advisory Agency, Fulbright Scholarship in 2009, 2008 Australia Day Achievement Medallion, and British Computer Society's Wilkes Award in 2008. He is also a Fellow of the Australian Computer Society, and a Senior Member of IEEE.

    View full text