Nothing Special   »   [go: up one dir, main page]

Skip to main content

User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 746))

Included in the following conference series:

Abstract

Authenticated querying is one of the prominent requirement of Internet of Things (IoT) or wireless networks of sensor devices to resist unauthorized users from accessing real time and confidential data. In this paper, we perform security analysis and find drawbacks of Das’s user authentication scheme (proposed in 2015). We propose an efficient authenticated key exchange mechanism using the concepts of the fuzzy extractor and Chinese Remainder Theorem. After that, we perform the security analysis of our scheme using widely accepted automated verification tools such as AVISPA and Scyther. Then, we perform logical verification using BAN Logic. Finally, we do the computational analysis, and we demonstrate the comparative analysis in respect of computational overhead and security features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64. ACM Press, Washington, DC (2004)

    Google Scholar 

  3. Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, pp. 1–9 (2006)

    Google Scholar 

  4. Tseng, H.R., Jan, R.H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM 2007), Washington, DC, USA, pp. 986–990 (2007)

    Google Scholar 

  5. Lee, T.H.: Simple dynamic user authentication protocols for wireless sensor networks. In: The Second International Conference on Sensor Technologies and Applications, pp. 657–660 (2008)

    Google Scholar 

  6. Ko, L.C.: A novel dynamic user authentication scheme for wireless sensor networks. In: IEEE International Symposium on Wireless Communication Systems (ISWCS 2008), pp. 608–612 (2008)

    Google Scholar 

  7. Vaidya, B., Silva, J.S., Rodrigues, J.J.: Robust dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the 5th ACM Symposium on QoS and Security for wireless and mobile networks (Q2SWinet 2009), Tenerife, Spain, pp. 88–91 (2009)

    Google Scholar 

  8. Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless. Comm. 8, 1086–1090 (2009)

    Article  Google Scholar 

  9. Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450–2459 (2010)

    Article  Google Scholar 

  10. Yuan, J., Jiang, C., Jiang, Z.: A biometric-based user authentication for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 15(3), 272–276 (2010)

    Article  MathSciNet  Google Scholar 

  11. Yoo, S.G., Park, K.Y., Kim, J.: A security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, 1–11 (2012)

    Google Scholar 

  12. Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36(1), 316–323 (2013)

    Article  Google Scholar 

  13. Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Network. Appl. 8(6), 1070–1081 (2014). https://doi.org/10.1007/s12083-014-0285-z

    Article  Google Scholar 

  14. Das, A.K.: A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. (2015). https://doi.org/10.1002/dac.2933

  15. Althobaiti, O., Al-Rodhaan, M., Al-Dhelaan, A.: An efficient biometric authentication protocol for wireless sensor networks. Int. J. Distrib. Sens. Netw. 1–13, Article ID 407971 (2013)

    Google Scholar 

  16. Sun, D.Z., Li, J.X., Feng, Z.Y., Cao, Z.F., Xu, G.Q.: On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquit. Comput. 17(5), 895–905 (2013)

    Article  Google Scholar 

  17. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_31

    Chapter  Google Scholar 

  18. Choi, S.J., Youn, H.Y.: An efficient key pre-distribution scheme for secure distributed sensor networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) EUC 2005. LNCS, vol. 3823, pp. 1088–1097. Springer, Heidelberg (2005). https://doi.org/10.1007/11596042_111

    Chapter  Google Scholar 

  19. Pathan, A.K., Dai, T.T., Hong, C.S.: An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks. In: Proceedings of The Sixth IEEE International Conference on Computer and Information Technology, CIT 2006, p. 227 (2006)

    Google Scholar 

  20. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  21. AVISPA. http://www.avispa-project.org/

  22. Cremers, C.: Scyther - Semantics and Verification of Security Protocols, Ph.D. dissertation, Eindhoven University of Technology, Netherlands (2006)

    Google Scholar 

  23. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. Royal Soc. Lond. 426, 233–271 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  24. Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy analysis of public-key cryptography on small wireless devices. In: Proceedings of the IEEE PerCom, Kauai, HI, pp. 324–328, March 2005

    Google Scholar 

  25. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  26. Benenson, Z., Gartner, F., Kesdogan, D.: User authentication in sensor networks. In: Proceedings of the Workshop on Sensor Networks. Lecture Notes Informatics Proceedings Informatik (2004)

    Google Scholar 

  27. Shi, W., Gong, P.: A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw., 730–831 (2013)

    Google Scholar 

  28. Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D.: Security enhanced user authentication protocol for wireless sensor networks using elliptic curve cryptography. Sensors 14, 10081–10106 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anup Kumar Maurya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maurya, A.K., Sastry, V.N. (2017). User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6898-0_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6897-3

  • Online ISBN: 978-981-10-6898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics