A Lightweight Anonymous Client–Server Authentication Scheme for the Internet of Things Scenario: LAuth
Abstract
:1. Introduction
- We propose a lightweight anonymous authentication for the Internet of things scenario; the scheme achieves various security features: perfect forward privacy, user anonymity, resistance to an offline dictionary attack, etc. In addition, to verify the security features of the proposed scheme, the proposed scheme is also verified by AVISPA and the BAN Logic.
- We specially design the password changing phase, making it more efficient compared to that in the related works.
- We simulate the proposed scheme and other related schemes using C++. The results show the communication cost and the computation cost are reduced compared with related proposals.
2. Related Work
3. The Proposed Scheme
3.1. Structure of the Scheme
- A client is the one who wants to access the services provided by the server. A client first registers at the server, after the registration, he can conduct a mutual authentication with the server, after authentication, the two can build a shared key, the client can access to the server’s service using this key.
- A server is the one that provides different kinds of services to the client. A server is also responsible for the registration and password modification for the client. Before the server provides a service to a client, the server has to make sure if the client is a registered one or not.
3.2. System Initialization
3.3. Registration Phase
- Client chooses a random number .
- Client calculates a hash message .
- Client sends to the server.
- Server calculates a hash message .
- Server calculates .
- Server chooses a random number .
- Server calculates a hash message .
- Server calculates .
- Server sends and other system parameters to the client .
3.4. Authentication Phase
- The client inserts its smart card into a card reader, inputs his identity and password .
- SC computes: .
- SC uses to get and .
- SC gets the current timestamp and the random number .
- SC gets a random number ∈ [1, n − 1], and calculates .
- SC gets the hash .
- SC computes .
- Finally, SC sends {} to the server .
- Server checks the freshness of the , if is not fresh, server abandons the incoming message, the scheme ends here.
- Server calculates the key based on .
- Server uses the key to decrypt to get , .
- Server calculates based on the identity .
- Server checks if , if they are equal, the server accepts the incoming message, otherwise, the scheme terminates here.
- Server gets a random number ∈ [1, n − 1], and calculates .
- Server calculates the shared key .
- Server calculates a new random number .
- Server calculates a hash message .
- Server calculates .
- Server computes .
- Server sends to the client .
- Client computes the shared key as .
- Client decrypts to get .
- Client computes the random number .
- Client checks if , if they are equal, accepts the shared key , and now client and the server can communicate using the shared key , otherwise the scheme terminates here.
- Client updates and .
3.5. Password Change Phase
- The client inserts his smart card into a card reader, inputs his identity and password and .
- SC computes: .
- SC uses to get and .
- SC gets the current timestamp and the random number .
- SC gets the hash .
- SC computes .
- Finally, SC sends {} to the server .
- Server checks the freshness of the , if is not fresh, server abandons the incoming message.
- Server calculates the key based on .
- Server uses the key to decrypt to get , .
- Server calculates based on the identity .
- Server checks if , if they are equal, the server verifies the incoming message, otherwise, the scheme terminates here.
- Server calculates .
- Server sends to the client .
- SC checks if , if they are equal, then the client is allowed to change his password.
- computes using the stored and the old .
- computes using the stored and the old
- Client inputs the new password .
- updates to be .
- uses this new to update the stored version of and to get , .
4. Security Analysis by AVISPA
5. Security Analysis Using BAN Logic
5.1. The Premise and Proof Goals
5.2. Assumptions
- According to the “-introduction” rule, client creates
- According to (1) and the “promotion ” rule:
- According to (2) and the “promotion ” rule:
- According to (3) and the “elimination of multipart messages” rule:
- 5.
- According to the “promotion ” rule:
- 6.
- According to (5) and the “elimination of multipart messages” rule:
5.3. The Proof of the Proposed Scheme
- 7.
- According to the message :
- 8.
- According to (7) and “ ‘,’-elimination” rule:
- 9.
- According to (8), A6 and “|∼ introduction” rule:
- 10.
- According to (9) and “ ‘,’-elimination” rule:
- 11.
- According to A4, (10), and “|∼elimination” rule:
- 12.
- According to A8, (11), and “jurisdiction or control” rule:
- 13.
- As is randomly created by , according to “#()- introduction” rule:
- 14.
- According to (13), A2, A4, and “#()- promotion” rule:
- 15.
- According to (11), (14), and “ introduction” rule:
- 16.
- According to the message :
- 17.
- According to (16) and “ ‘,’-elimination” rule:
- 18.
- According to (17), A5 and “|∼ introduction” rule:
- 19.
- According to (18) and “ ‘,’-elimination” rule:
- 20.
- According to A3, (19), and “|∼elimination” rule:
- 21.
- According to A7, (20), and “jurisdiction or control” rule:
- 22.
- As is randomly created by , according to “#()- introduction” rule:
- 23.
- According to (22), A1, A3, and “#()- promotion” rule:
- 24.
- According to (20), (23), and “ introduction” rule:
6. Formal Security Analysis
7. Comparison
7.1. Computational Performance Analysis
7.2. Communication Performance Analysis
8. Security Feature Analyses
8.1. Client Anonymity
8.2. Perfect Forward Privacy
8.3. Reply Attack
8.4. Offline Dictionary Attack
- The adversary insert the smart card into a card reader, inputs a random identity and password pair and .
- SC computes: .
- SC uses to get and .
- SC gets the current timestamp , and gets .
- SC gets a random number ∈ [1, n − 1], and calculates .
- SC gets the hash .
- SC computes .
- Finally, SC sends {} to the server .
- If the server sends back a replay message, the identity and password pair is correct, otherwise, go to step 1.
- The adversary inserts the smart card into a card reader, inputs a random identity and password pair and .
- The adversary waits for the computation of the smart card.
- If the smart card sends out a message, the identity and password pair is correct, otherwise, goes to step 1.
8.5. Impersonation Attack
8.6. Secret Information Leakage Problem
9. Conclusions
Author Contributions
Funding
Conflicts of Interest
Appendix A
Appendix B
p = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE FFFFFC2F |
a = 0 |
b = 7 |
= 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B |
= 483ADA77 26A3C465 5DA4FBFC 0E1108A8 FD17B448 A6855419 9C47D08F |
n = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE BAAEDCE6 AF48A03B BFD25E8C D0364141 |
h = 01 |
References
- Almenares, F.; Arias, P.; Marin, A.; Diaz-Sanchez, D.; Sanchez, R. Overhead of using secure wireless communications in mobile computing. IEEE Trans. Consum. Electron. 2013, 59, 335–342. [Google Scholar] [CrossRef]
- Potlapally, N.R.; Ravi, S.; Raghunathan, A.; Jha, N.K. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mob. Comput. 2006, 5, 128–143. [Google Scholar] [CrossRef]
- Tu, H.; Kumar, N.; Chilamkurti, N.; Rho, S. An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Netw. Appl. 2015, 8, 903–910. [Google Scholar] [CrossRef]
- Farash, M.S. Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Netw. Appl. 2016, 9, 82–91. [Google Scholar] [CrossRef]
- Ibrahim, M.H.; Kumari, S.; Das, A.K.; Wazid, M.; Odelu, V. Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput. Methods Programs Biomed. 2016, 135, 37–50. [Google Scholar] [CrossRef] [PubMed]
- Chaudhry, S.A.; Naqvi, H.; Mahmood, K.; Ahmad, H.F.; Khan, M.K. An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 2017, 96, 5355–5373. [Google Scholar] [CrossRef]
- Kumari, S.; Chaudhry, S.A.; Wu, F.; Li, X.; Farash, M.S.; Khan, M.K. An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 2017, 10, 92–105. [Google Scholar] [CrossRef]
- Liu, J.; Zhang, L.; Sun, R. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks. Sensors 2016, 16, 728. [Google Scholar] [CrossRef] [PubMed]
- Xiong, H. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol. IEEE Trans. Inf. Forensics Secur. 2014, 9, 2327–2339. [Google Scholar] [CrossRef]
- Liu, J.; Zhang, Z.; Chen, X.; Kwak, K.S. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 332–342. [Google Scholar] [CrossRef]
- Idrissi, H. Anonymous ECC-Authentication and Intrusion Detection Based on Execution Tracing for Mobile Agent Security. Wirel. Pers. Commun. 2017, 94, 1799–1824. [Google Scholar] [CrossRef]
- Xiong, L.; Peng, D.; Peng, T.; Liang, H.; Liu, Z. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks. Sensors 2017, 17, 2681. [Google Scholar] [CrossRef] [PubMed]
- Li, X.; Ibrahim, M.H.; Kumari, S.; Sangaiah, A.K.; Gupta, V.; Choo, K.-K.R. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Netw. 2017, 129, 429–443. [Google Scholar] [CrossRef]
- Kumari, S.; Khan, M.K. Cryptanalysis and improvement of “a robust smart-card-based remote user password authentication scheme”. Int. J. Commun. Syst. 2014, 27, 3939–3955. [Google Scholar] [CrossRef]
- Jiang, Q.; Ma, J.; Li, G.; Yang, L. An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks. Wirel. Pers. Commun. 2014, 77, 1489–1506. [Google Scholar] [CrossRef]
- Li, X.; Niu, J.; Kumari, S.; Liao, J.; Liang, W.; Khan, M.K. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Netw. 2015, 15, 2643–2655. [Google Scholar] [CrossRef]
- Wu, F.; Xu, L.; Kumari, S.; Li, X. A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl. 2017, 10, 16–30. [Google Scholar] [CrossRef]
- Das, A.K. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 2016, 9, 223–244. [Google Scholar] [CrossRef]
- Wu, F.; Xu, L.; Kumari, S.; Li, X. A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks. Comput. Electr. Eng. 2015, 45, 274–285. [Google Scholar] [CrossRef]
- Odelu, V.; Das, A.K.; Goswami, A. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards. Secur. Commun. Netw. 2015, 8, 4136–4156. [Google Scholar] [CrossRef]
- Wang, C.; Xu, G.; Sun, J. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks. Sensors 2017, 17, 2946. [Google Scholar] [CrossRef] [PubMed]
- Islam, S.H. Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn. 2014, 78, 2261–2276. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Xu, B.; Huang, X. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
- Islam, S.H.; Khan, M.K. Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. Int. J. Commun. Syst. 2016, 29, 2442–2456. [Google Scholar] [CrossRef]
- Porambage, P.; Schmitt, C.; Kumar, P.; Gurtov, A.; Ylianttila, M. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications. Int. J. Distrib. Sens. Netw. 2014, 2014, e357430. [Google Scholar] [CrossRef]
- Tsai, J.L.; Lo, N.W. A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. IEEE Syst. J. 2015, 9, 805–815. [Google Scholar] [CrossRef]
- Mishra, D.; Das, A.K.; Mukhopadhyay, S. A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Netw. Appl. 2016, 9, 171–192. [Google Scholar] [CrossRef]
- Li, X.; Peng, J.; Kumari, S.; Wu, F.; Karuppiah, M.; Choo, K.K. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 2017. [Google Scholar] [CrossRef]
- Nam, J.; Choo, K.K.; Han, S.; Kim, M.; Paik, J.; Won, D. Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation. PLoS ONE 2015, 10, e0116709. [Google Scholar] [CrossRef] [PubMed]
- Armando, A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Drielsma, P.H.; Héam, P.C.; Kouchnarenko, O.; Mantovani, J.; et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In Proceedings of the International Conference on Computer Aided Verification, Edinburgh, UK, 6–10 July 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 281–285. Available online: http://link.springer.com/chapter/10.1007/11513988_27 (accessed on 29 October 2018).
- Turuani, M. The CL-Atse Protocol Analyser. In Lecture Notes in Computer Science, Proceedings of the 17th International Conference on Rewriting Techniques and Applications, RTA, Seattle, WA, USA, 12–14 August 2006; Pfenning, F., Ed.; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
- Basin, D.; Mödersheim, S.; Vigano, L. Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In Proceedings of the CCS’03, Washington, DC, USA, 27–30 October 2003; Atluri, V., Liu, P., Eds.; ACM Press: New York, NY, USA, 2003; pp. 335–344. Available online: http://www.avispa-project.org (accessed on 29 October 2018).
- Basin, D.; Mödersheim, S.; Vigano, L. OFMC: A Symbolic Model-Checker for Security Protocols. Int. J. Inf. Secur. 2005, 4, 181–208. [Google Scholar] [CrossRef]
- Burrows, M.; Abadi, M.; Needham, R.M. A Logic of Authentication. Proc. R. Soc. Lond. A Math. Phys. Eng. Sci. 1989, 426, 233–271. [Google Scholar] [CrossRef]
- Chen, Y.; Martínez, J.F.; Castillejo, P.; López, L. A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth. Wirel. Commun. Mob. Comput. 2017, 2017, 5290579. [Google Scholar] [CrossRef]
- Available online: https://github.com/SevenBruce/lAuth (accessed on 28 September 2018).
- Available online: https://libraries.docs.miracl.com/miracl-user-manual/about (accessed on 1 March 2018).
- Available online: https://github.com/miracl/MIRACL (accessed on 28 September 2018).
- Available online: https://csrc.nist.gov/csrc/media/publications/fips/186/3/archive/2009-06-25/documents/fips_186-3.pdf (accessed on 3 April 2018).
Symbols | Meaning |
---|---|
S | The server |
The client | |
The client’s identity | |
|| | String connector, connecting two strings |
⊕ | XOR operation |
P | The generator of ECC |
Timestamp | |
h | The SHA-256 hash function |
A hash a string to a random number function |
Client | Server |
---|---|
master key | |
random number | |
random number | |
Stores |
Client | Server |
---|---|
Master Key | |
User: inserts SC into the terminal | |
User: input and | |
SC: | |
SC: | |
SC: | |
SC: gets timestamp , | |
Random number , | |
SC: gets | |
SC: | |
Checks the freshness of | |
Check if | |
Random number , | |
Check if | |
, | |
Agree on the key |
Client | Server |
---|---|
Master Key | |
User: inserts SC into the terminal | |
User: input and | |
SC: | |
SC: | |
SC: | |
SC: gets timestamp , | |
SC: gets | |
SC: | |
Check the freshness of | |
Check if | |
. | |
Check if | |
CL-AtSe Back-End | OFMC |
---|---|
SUMMARY | % OFMC |
SAFE | % Version of 2006/02/13 |
DETAILS | SUMMARY |
BOUNDED_NUMBER_OF_SESSIONS | SAFE |
TYPED_MODEL | DETAILS |
PROTOCOL | BOUNDED_NUMBER_OF_SESSIONS |
/home/iotdev/avispa/avispa-1.1/testsuite/results/light.if | PROTOCOL |
/home/iotdev/avispa/avispa-1.1/testsuite/results/light.if | |
GOAL | GOAL |
As Specified | as_specified |
BACKEND | |
BACKEND | OFMC |
CL-AtSe | COMMENTS |
STATISTICS | |
STATISTICS | parseTime: 0.00s |
searchTime: 0.01s | |
Analysed: 1 states | visitedNodes: 4 nodes |
Reachable: 0 states | depth: 2 plies |
Translation: 0.00 s | |
Computation: 0.00 s |
Message | Flow | Idealized Form |
---|---|---|
1 | ||
2 |
Number | Assumptions | Number | Assumptions |
---|---|---|---|
A1 | A2 | ||
A3 | A4 | ||
A5 | A6 | ||
A7 | A8 |
Reference | Registration Phase | Authentication Phase | Password Change Phase |
---|---|---|---|
Tu et al. [3] | 2TH + 1TMUL | 10TH + 7TMUL + 1TADD | 6TH + 1TMUL + 4TE/D |
Chaudhry et al. [6] | 5TH + 1TMUL | 14TH + 6TMUL + 1TADD | --- |
Wu et al. [19] | 4TH | 12TH + 4TMUL + 4TE/D | 9TH + 1TMUL + 2TE/D |
Our scheme | 3TH | 14TH + 4TMUL | 9TH |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, Y.; Martínez, J.-F.; Castillejo, P.; López, L. A Lightweight Anonymous Client–Server Authentication Scheme for the Internet of Things Scenario: LAuth. Sensors 2018, 18, 3695. https://doi.org/10.3390/s18113695
Chen Y, Martínez J-F, Castillejo P, López L. A Lightweight Anonymous Client–Server Authentication Scheme for the Internet of Things Scenario: LAuth. Sensors. 2018; 18(11):3695. https://doi.org/10.3390/s18113695
Chicago/Turabian StyleChen, Yuwen, José-Fernán Martínez, Pedro Castillejo, and Lourdes López. 2018. "A Lightweight Anonymous Client–Server Authentication Scheme for the Internet of Things Scenario: LAuth" Sensors 18, no. 11: 3695. https://doi.org/10.3390/s18113695