Rethinking Authentication on Smart Mobile DevicesView this Special Issue
Research Article | Open Access
Wenting Li, Bin Li, Yiming Zhao, Ping Wang, Fushan Wei, "Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks", Wireless Communications and Mobile Computing, vol. 2018, Article ID 8539674, 11 pages, 2018. https://doi.org/10.1155/2018/8539674
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and academic community. To facilitate real-time data access for external users from the sensor nodes directly, password-based authentication has become the prevalent authentication mechanism in the past decades. In this work, we investigate three foremost protocols in the area of password-based user authentication scheme for WSNs. Firstly, we analyze an efficient and anonymous protocol and demonstrate that though this protocol is equipped with a formal proof, it actually has several security loopholes been overlooked, such that it cannot resist against smart card loss attack and violate forward secrecy. Secondly, we scrutinize a lightweight protocol and point out that it cannot achieve the claimed security goal of forward secrecy, as well as suffering from user anonymity violation attack and offline password guessing attack. Thirdly, we find that an anonymous scheme fails to preserve two critical properties of forward secrecy and user friendliness. In addition, by adopting the “perfect forward secrecy (PFS)” principle, we provide several effective countermeasures to remedy the identified weaknesses. To test the necessity and effectiveness of our suggestions, we conduct a comparison of 10 representative schemes in terms of the underlying cryptographic primitives used for realizing forward secrecy.
Currently, wireless sensor networks (WSNs) have become one of the most standard services employed in commercial and industrial applications and proved to be a leading area of research [1–3]. Like many advanced technologies, the original appliance of WSNs can be found in military and heavy industrial applications. In the 1950s, the first modern WSN—the Sound Surveillance System (SOSUS)—is developed by the United States Military and used for detecting Soviet submarines . Nowadays, WSNs thrive in industrial and consumer applications, including machine health monitoring, environmental sensing, natural disaster prevention, and health care monitoring [5–7].
A wireless sensor network generally includes a central gateway node (GWN, so-called base station), a large number of circulating, self-directed and low powered devices named sensor nodes, and a set of end users. The GWN acts as a bridge between WSNs and the other networks and also a powerful data managing and processing center. Sensor nodes are multifunctional, energy efficient devices and are spatially distributed over the networks for caringly collecting, processing, and transferring data.
In many critical applications, remote users are usually keen on real-time accessing with sensor nodes [8, 9], yet if data queries are carried out by the gateway node, efficiency and accuracy might not be guaranteed over the long transmission path between GWN and the sensors. Accordingly, password-based user authentication proves to be a proper solution for this issue as its security, simplicity, and portability [10–12]. That is, users are first authenticated by remote sensor nodes before being permitted to access data.
In 2006, Wong et al.  proposed the first password-based authentication scheme for wireless sensor networks that allows legitimate users to query sensitive information at every sensor of the network. However, shortly after this protocol was presented, Tseng et al.  and Das et al.  pointed out that Wong et al.’s scheme  is vulnerable to replay attack, forgery attack, and node capture attack separately, then an enhanced one based on smart card was firstly proposed by Das et al. . Unfortunately, Khan and Alghathbar , Chen et al. , and Yeh et al.  pointed out some weaknesses in Das et al.’s scheme, such as suffering from impersonation attack, insider attack, and the violation of user anonymity and key agreement. Then some improvements are made in these works.
However, in 2013, Shi and Gong  found that Yeh et al.’s scheme  cannot achieve mutual authentication and user anonymity, then they proposed an efficient ECC-based authentication scheme for WSNs. At the same time, Khan and Alghathbar’s protocol  was also proven insecure against insider attack, smart card loss attack and forgery attack by Vaidya et al.  and Chen et al.’s scheme  was shown as vulnerable to impersonation attack, replay attack and GWN by passing attack in . Later, Choi et al.  demonstrated that Shi and Gong’s scheme  is vulnerable to smart card loss attack and an enhanced scheme was given in . Meanwhile, Xue et al.  presented a temporal credential-based two-factor (i.e., smart card and password) authentication scheme for WSNs. Although their scheme retains many admirable properties, there are some weaknesses being found by researchers [8, 11, 24], such as offline password guessing, insider, impersonation, and tracking attacks.
Quite recently, Li et al.  analyzed the security of Jiang et al.’s scheme  (an improvement based on ) and showed that their scheme suffers from user friendliness issue, desynchronization problem, and is inapplicable for WSN environments. Then a new scheme was proposed in ; however, in this paper, we reveal that Li et al.’s scheme  still fails to eliminate the security pitfalls of smart card loss attack and the violation of forward secrecy. At the same time, we find that the newly proposed schemes by Amin et al.  and Wu et al.  are prone to the same security defects with Li et al.’s scheme .
From the above analysis, it can be seen that many of the previous protocols are not much satisfactory. On the one hand, this is because the lack of necessary principles. Some principles that have been proven are still ignored in the design of the protocol, such as user anonymity principle  and perfect forward secrecy principle . On the other hand, the protocol designers usually do not follow unified evaluation criteria, and they tend to emphasize the advantages of their new designed protocol, but ignore its inadequacies. Besides reporting the security flaws in [8, 9, 25], we also provide effective countermeasures and refinements to overcome these pitfalls, accordingly, examine the necessary of our suggestions.
Contributions. In this work, we mainly review and analyze three state-of-the-art authentication protocols proposed by Li et al. , Amin et al. , and Wu et al. . And reveal that all these three schemes suffer from smart card loss issue and cannot achieve forward secrecy. Then we suggest several possible countermeasures to overcome these pitfalls. We also provide a comparison of 10 representative schemes for wireless sensor networks which emphatically considered how and with what technology did they realize forward secrecy. This illustrates the necessity and effectiveness of our suggestions and provides a better understanding of the exiting schemes.
Organization. The remainder of this paper is organized as follows. Section 2 reviews and demonstrates the pitfalls of Li et al.’s scheme. Section 3 cryptanalyzes Amin et al.’s protocol with proper countermeasures over discovered flaws. Section 4 describes the weaknesses of Wu et al.’s protocol and compares 10 representative schemes. The conclusion is made in Section 5.
2. Cryptanalysis of Li et al.’s Scheme
Earlier in 2018, Li et al.  presented a three-factor anonymous and efficient authentication scheme for wireless sensor networks. Although their scheme has many attractive properties, such as the provision of user anonymity and local password change, it still fails to attain many of the claimed goals. In this section, we will demonstrate that though Li et al. try to settle the user friendliness issue of Jiang et al.’s scheme , their solution leads to offline dictionary attack. And we also observe that Li et al.’s scheme cannot preserve forward secrecy, which is the most crucial goal for WSNs.
2.1. Review of Li et al.’s Scheme
In this subsection, we briefly revisit Li et al.’s scheme . For ease of description, some intuitive notations and abbreviates are listed in Table 1 and will appear throughout this paper. Their scheme includes three main phases: registration, login and authentication, and password change. We will follow their presentations as close as possible.
2.1.1. Registration Phase
Before the registration phase of Li et al.’s  scheme, the gateway node defines a finite cyclic group = <> of order a large prime number . This group could be an elliptic curve group, or it could be a prime order subgroup of . Then GWN chooses two random numbers , as its master secret key and computes as its public key. Ultimately, GWN publishes and stores , securely.
Sensor Registration Phase. GWN chooses an identity and computes the secret key for each sensor node. Then, GWN embeds in the memory of and deploys it in the particular area.
User Registration Phase. When a user aims to acquire the sensitive information of remote sensor nodes, the following procedure is carried out by firstly.
(1) chooses an identity , a password , and a nonce and calculates . Then imprints his/her biometric on a specific device.
(2) GWN: .
(3) Once obtaining ’s registration request, GWN generates a random codeword and computes , where and . GWN further computes and and keeps , into a new smart card . At the same time, GWN stores in its database.
(4) GWN .
(5) When receiving the smart card, stores into it.
2.1.2. Login and Authentication Phase
In this phase, the following steps are performed by , , and GWN as well as negotiating a session key.
(1) inserts into a card reader and inputs on a specific device. Then computes and checks whether . If not, terminates the session. Otherwise, asks to input and and computes . Then checks whether . If it does not hold, rejects the session. Otherwise, chooses two random numbers and and then calculates , , , , , , and .
(2) GWN: .
(3) Upon receiving the login request, GWN computes and and verifies if is in the database. If not, the request is aborted. Otherwise, GWN computes , , , and and checks whether . If it does not hold, GWN terminates the session. Otherwise, GWN selects a random number and computes , , , , and
(4) GWN .
(5) When receiving the message, computes , , , and and checks whether . If not, the session is rejected. Otherwise, selects a random number and computes , , and .
(6) GWN: .
(7) After getting the response message, GWN computes , , and and checks whether . If not, GWN aborts the session. Otherwise, GWN calculates , , and .
(8) GWN .
(9) When receiving the response message, computes , , , and and checks whether . If it does not hold, terminates the connection. Otherwise, and establish a connection with a session key.
2.2. Cryptanalysis of Li et al.’s Scheme
A concrete and concise adversarial model is essential for a good design of user authentication scheme in wireless sensor networks. Though lacking of specification in Li et al.’s scheme , the following assumptions about the adversary’s capabilities are implicitly made in :
(1) Two communication channels exist: one is a secure, or a private channel which is mainly used for registration; another is a public channel which acts on login and authentication phases. As in the conventional authentication protocols, the adversary is modeled to have full control of the public channel; i.e., can eavesdrop, intercept, and modify and redirect any transmitted messages between the communication parties [3, 6].
(2) The user-memorable identities and passwords are of low entropy and can be offline enumerated by at the same time within polynomial time.
(3) When considering truly multifactor authentication (i.e., the scheme is secure even if one or more factors are cracked ), it is rational to assume that may (i) learn a victim’s password such as phishing or shoulder surfing attacks, (ii) extract the secret parameters in the lost smart card by side-channel attack, or (iii) obtain a victim’s biometric information via malicious device, but cannot achieve all. Otherwise, it is a trivial case.
(4) To delineate the critical feature of forward secrecy, is allowed to corrupt any valid entities to obtain its longterm secret key(s). In addition, previous session key(s) may be revealed by as a possible reason of improper erasure [10, 27].
It is worth noting that the above adversarial model, following the existing works in [3, 6, 7, 10, 28], is one of the few ones that apply to multifactor authentication in WSNs. For the sake of user friendliness, many protocols allow their users to select his/her identity and password . However, the user usually chooses easy-to-remember identity (e.g., email, phone number) and password, which are of low entropy ( [29, 30]) and can be offline enumerated by within polynomial time. Besides, assumption (3) specifies truly three-factor security and assumption (4) is used to capture the crucial notion of forward secrecy when GWN or any sensor node is corrupted. In the following sections, our analysis will take account of these four assumptions.
2.2.1. Smart Card Loss Attack
In , Li et al. pointed out that Jiang et al.’s scheme  lacks timely detection mechanism, which means once a user inputs wrong identity or password unintentionally, the system will remain executing the following login and authentication phases. Undoubtedly, this interaction process will bring extra cost. In reality, it is a common accident as users usually involve in countless applications and manage various pairs of identity and password . To solve this problem, Li et al.’s scheme  inserts a verification item in the smart card for the purpose of providing timely detection and performing password change without any interaction with the GWN. However, their modification goes back to the “security-usability” balance problem proposed by Huang et al. ; that is, it realizes local password change but brings offline dictionary attack. We illustrate this attack as below.
Step 1. chooses a pair () from , where represents the identity space and represents the password space.
Step 2. computes , where is extracted from the victim’s smart card and can be obtained by computing with the help of malicious device.
Step 3. verifies the correctness of () pair by checking whether the computed equals the extracted .
Step 4. repeats the above Steps ~ until the right values are found.
Besides the previous reasonable assumption (3), it should be pointed out that, in the registration phase of Li et al.’s scheme , imprints his/her biometric information on a specific device and simply submits the plain-text to GWN. Then, GWN employs the fuzzy commitment technology  and the generated to compute . In such situation, if a privileged insider, e.g., the administrator, has learned the user’s biometric information, she is able to complete the above offline guessing attack. Of course, she is able to impersonate the victim to login other applications as biometric characteristics cannot be easily changed.
For another, in order to realize user friendliness, most password-based authentication schemes (e.g., [8, 9, 11]) allow users to choose his/her own and , and Li et al.’s scheme is no exception. However, users usually tend to choose easy-to-remember and thus of low entropy identities and passwords, so that it is reasonable to make the assumption (2) that can offline enumerate all the () pairs within polynomial time. The running time of the above attack procedure is , where denotes the number of identities, denotes the number of passwords, and is the running time for Hash operation. Since and are very limited in practice (e.g., [29, 30]), our above attack is meaningful and poses a real challenge to user authentication protocols for wireless sensor networks.
2.2.2. The Violation of Forward Secrecy
WSNs are generally deployed in security-critical applications, such as battlefield surveillance and health care monitoring [7, 27, 32, 33]. The sensor nodes at risk had been driven: on one hand, due to the unattended environments and low-cost considerations, it is easier for an adversary to focus on sensors access to breakthrough success; on the other hand, sensors often perform extremely sensitive tasks and thus, they preserve sensitive information and exhibit greater attack surface. Consequently, sensor nodes are more vulnerable to serious attacks, so that an admired authentication scheme for WSNs ought to be guaranteed against node capture attack.
Unfortunately, Li et al.’s scheme  cannot resist against this severe node capture attack. Let us consider the following scenarios. In case a sensor node has been compromised by an adversary and the stored secret key can be extracted. This assumption is sound as made in assumption (4) and it is also implicitly described in Li et al.’s scheme . With the extracted , can successfully obtain the previous session key between and any user , as follows.
Step 1. Eavesdrop and intercept the message sending from GWN to .
Step 2. Compute , , and .
Step 3. Intercept the message sending from to GWN.
Step 4. Compute .
Step 5. Intercept the login message sending from to GWN.
Step 6. Compute .
Step 7. Compute the previous session key as .
There are some points to be noted regarding the aforementioned attack. Firstly, the reason why we add Steps 5 and 6 is that these two steps are conducive to check the parameters though has already known . Then, it is not hard to see that only needs to eavesdrop over the public channel with simple computations to complete the aforementioned attack procedure. Consequently, the desirable security goal of perfect forward secrecy (PFS) cannot be attained by Li et al.’s scheme.
Despite considerable attention has been paid to forward secrecy issue, many prior works still explicitly or implicitly use an incorrect computation for the session key(s) (e.g., [8, 9, 21, 34]). This is mainly due to the violation of the “PFS principle” suggested in : (i) public-key techniques are indispensable; (ii) at least two exponentiation operations are conducted on server side. Though Ma et al.  emphasize this principle on client-server architecture, after careful analysis, we find this “PFS principle” is suitable for WSN environments (i.e., three-party environment). In this cases, we will take GWN and sensors as server side, while keeping users as client.
Accordingly, elliptic curves cryptosystem (ECC) is a reasonable choice for overcoming this pitfall, whereas in their original scheme  Li et al. employ this mechanism to greatly attain user anonymity. To make a precisely modification, we assume to be and to be , where point is a generator mentioned before and , are two random numbers chosen by and separately. Note that GWN has no need to be involved in negotiating the session key. Then in this way, the session key can be recalculated as . As it is generated by session-variant random numbers and and computationally infeasible to guess from transmitted message due to discrete logarithm problem, Li et al.’s scheme  will be secure against node capture attack and provide forward secrecy perfectly after slight modifications.
2.2.3. Mistakes in the Proof
The emergence of BAN logic opens up a new chapter in the proof of user authentication protocol [35, 36]; it can not only be used to prove whether the protocol achieves some desired goals, but also be employed to find some defects in the protocol. However, there still are some problems in the application of BAN logic. On the one hand, BAN logic cannot prove whether the protocol achieves all security goals and desirable properties. For example, it cannot prove that the protocol resists against parallel session attack, denial-of-service attack, node capture attack, etc. On the other hand, the analysis of BAN logic depends on some basic assumptions and the initial hypotheses. If the initial hypotheses was not sound, the formal analysis will lead to erroneous conclusions.
In the formal proof of Li et al.’s scheme  with BAN logic, there are several minor problems. Firstly, Li et al. add a new logic rule, session keys rule:
However, it is better to explain the calculation method of and the key role of in . Otherwise, we cannot derive that believes and share from the upper part of the equation.
Secondly, we suggest that the initiative premises p13 and p14, i.e., GWN and GWN, respectively, should be derived from the translation messages, but not in the premises. Finally, they may ignore some details in the formal proof, such as in the D5, it is better to add GWN, which we cannot find in the assumption or derive from the front. It also can be seen that the correctness of the protocol cannot be guaranteed only by using the formal proof.
3. Cryptanalysis of Amin et al.’s Scheme
Recently, Amin et al.  proposed a lightweight protocol for IoT-enabled devices for cloud computing environments. The private information is usually stored in distributed cloud servers (e.g., sensors), so that distributed nodes are confronted with the same security threats of sensors in wireless sensor networks. After careful analysis, we find that though equipped with a formal proof and exhibiting great application prospects, Amin et al.’s scheme still cannot resist against smart card loss attack and also fail to provide user anonymity and forward secrecy.
3.1. Review of Amin et al.’s Scheme
3.1.1. Registration Phase
The registration phase of Amin et al.’s scheme can be divided into cloud server registration and user registration.
Cloud Server Registration Phase. In this phase, any cloud server sends a self-chosen identity and random number pair to control server (CS). Then CS chooses a random number , computes , , and responds to securely. Finally, stores in the memory.
User Registration Phase. Firstly, a user chooses his/her identity , password , and two random numbers . Then computes , , and and sends to CS via secure channel. Upon receiving the registration request, the CS computes , , and with its secret key. Finally, CS replies a smart card with . After getting the smart card , computes and records , into it.
3.1.2. Login and Authentication Phase
In order to access remote server resources, a legal user inserts his/her smart card into a card reader and inputs , . Then the following steps are performed:
(1) SC computes , , , , and and verifies whether . If so, SC selects a random number and computes , , , and , where is ’s identity chosen by and is the current timestamp. Otherwise, SC terminates the session.
(3) Upon receiving the login request, checks whether holds, where is ’s current timestamp and is the expected valid time interval. If it does not hold, rejects the connection. Otherwise, produces a random number and computes , .
(5) Once receiving the message from , CS first checks the validity of time interval . If the verification holds, CS continues to compute , , , and and checks whether . If either of the above verification fails, CS terminates the procedure. Otherwise, CS keeps on calculating , , and and verifies whether the computed equals the received one. If not, CS aborts the session. Otherwise, CS chooses a random number and computes , , , , and .
(7) While receiving the message from CS, computes , , , and and checks the condition holds or not. If it does not hold, terminates the connection. Otherwise, sends to via public channel.
(8) After receiving the response message from , computes , , , and and verifies whether . If so, successfully authenticates and and establish a session key .
3.2. Cryptanalysis of Amin et al.’s Scheme
The four assumptions made in Section 2.2 are also explicitly employed in Amin et al.’s work  when they analyze the security of Xue et al.’s scheme  and Chuang et al.’s scheme  and proof the safety of their scheme. Consequently, our following discussions will base on these four assumptions.
3.2.1. No Provision of User Anonymity
Nowadays, privacy concerns are attracting more and more attention among governments, organizations, and individuals, and anonymous privacy-preserving authentication protocols are of particular interest. This is because the violation of user anonymity, say the leakage of some user-specific (static) information, may facilitate a malicious adversary to track the victim’s current activities and login history [7, 39]. Generally, there are two kinds of user anonymity attributes, basic and advanced : (i) user protection, which means cannot obtain the real of the user; (ii) user untraceability, which means is unable to tell who the user is and distinguish whether two communications are coming from the same user. In wireless sensor networks, the latter notion has been widely adopted (e.g., [40–42]), so does Amin et al.’s scheme.
In 2014, Das et al.  firstly introduced a “dynamic ID technique” to achieve user anonymity: a user’s real is concealed in the session-variant pseudonym identities. Subsequently, many schemes (e.g., [25, 44, 45]) follow this technique, which are so-called “dynamic ID” schemes, and Amin et al.’s scheme  falls into this category. However, after careful analysis, we find that Amin et al.’s scheme cannot achieve user anonymity in practice. To be specific, in the login phase of their scheme, Amin et al. try to compute a pseudonym identity as a dynamic identity. On one hand, is specific to the legitimate user ; on the other hand, is kept static and transmitted in plain of all the ’s login messages .
Accordingly, this specific value can be seen as ’s “identification”, and thus can exploit it to identify and track in the whole system. To conduct the aforementioned attack, an adversary only needs to eavesdrop the transmission channel without other contact operations and computations. This well serves to show the violation of user anonymity on Amin et al.’s scheme , thereby contradicting their claim.
3.2.2. Smart Card Loss Attack
Amin et al.  showed that, in Xue et al.’s protocol , users’ passwords can be offline guessed once has somehow obtained (lost or stolen) the victim’s smart card and extracted the stored secret information. Then Amin et al. attempt to overcome this pitfall in their new proposed scheme. However, precisely the same deficiency still exits in Amin et al.’s enhanced version. Let us consider the following scenario, suppose that has obtained the secret parameters stored in ’s smart card (e.g., by side-channel attack [46–48] and reverse engineering technique ), which is reasonable under assumption (3). Then can conduct the following procedure to guess ’s password.
Step 1. Choose a pair of () from the identity space and password space .
Step 2. Compute , , , , and .
Step 3. Verify whether the computed equals the extracted .
Step 4. Repeat Steps 1, 2, and 3 until finding the correct values.
Let and denote the size of and , and the time complexity of the aforementioned attack is , which is linearly associated with the running time of Hash operation and can be finished in a few days as the limited size of [29, 30].
Further, according to assumption (1), is capable of eavesdropping and intercepting the normal (previous successful) login message between and over the public channel. It is fair to assume that has already obtained the correct value of , then Step 2 might be changed to compute , , , and and compared the computed with the intercepted in Step 3. In this way, the time complexity of the above procedure reduces to , where the exclusive and concatenation operations are too small to overlook.
Note that both of the above two attacks are carried out offline without any interaction with the control server. Hence, there is no way for CS to find abnormality and the adversary can impersonate at anytime until CS revokes the victim’s smart card. All in all, our analysis demonstrates the feasibility of smart card loss attack on Amin et al.’s scheme .
3.2.3. The Violation of Forward Secrecy
As mentioned in Section 2.2.2, Amin et al.’s scheme  also subjects to node capture attack. In such cases, the captured nodes may enable an adversary to compromise communications between other noncaptured nodes or obtain previous session keys. We will show this pitfall in this subsection. Assume that a malicious adversary has compromised a cloud server and extracted the secret parameters stored in its memory, can recover the previous session key as follows.
Step 1. Intercept the message sending from to .
Step 2. Compute , where is extracted from the compromised node .
Step 3. Intercept the message sending from to .
Step 4. Compute .
Step 5. Compute the session key .
In light of and which are all correct values, manages to find the previous session key. Hence, the desirable property of forward secrecy can not be attained by Amin et al.’s scheme . Similar to Li et al.’s scheme , this also due to the violation of “PFS principle”. Except the ECC technique mentioned before, we suggest this issue to be well addressed by introducing another high-efficiency technique, i.e., Chebyshev polynomials semigroup property (so-called chaotic maps).
For this property, given , , and , it is intractable to find , where is a variable and denote the integer degree . Assume the control server chooses and writes a variable value in each user’s smart card in the registration phase. Then we slightly modify the random numbers to be and to be , and thus the session key can be calculated as . For higher security, it is better to involve other secret parameters such as , . In this way, the improvement of Amin et al.’s scheme  can achieve perfect forward secrecy based on computational Diffie-Hellman problem.
3.2.4. Mistakes in the Proof
Similarly, the security proof in Amin et al.’s scheme  does not capture realistic security threat. There are three main reasons: (1) The error of initial hypothesis. In the formal proof of Amin et al.’s scheme , they make an assumption A11: , which is the same as Goal 3. This demonstrates that the proof of Goal 3 is not necessary. (2) The wrong usage of logic rules. We take Step S2 as an example. This step is based on the message meaning rule and derives that believes said from A11 and S1. However, according to the message meaning rule, we cannot obtain this conclusion from A11. Hence, A11 should be changed to . (3) Using undefined new rules. Amin et al.  also employ a new session keys rule, but they did not give a definition of the new rule.
4. Cryptanalysis of Wu et al.’s Scheme
In this section, we will review and analyze Wu et al.’s scheme , which is a lightweight and relatively robust two-factor authentication scheme for wireless medical sensor networks. In , Wu et al. have found some security pitfalls in historical schemes and attempted to overcome all these flaws in the new proposed one. Besides, Wu et al.  use NS-3, a simulation tool to prove the security of their proposed protocol. Note that, the simulation process can only prove the validity of their protocol, including the viable communication between the sensor node and the user, the probable communication time, system size, etc. However, it can not prove whether their protocol resists against various known attacks. In the following section, we find Wu et al.’s improved scheme still fails to attain the most important goal of forward secrecy and is prone to user friendliness issue.
4.1. Review of Wu et al.’s Scheme
This subsection briefly reviews Wu et al.’s  scheme, which involves four critical phases: registration, login, authentication and password change, and a previous initialization. We simplify initialization phase in the registration phase.
4.1.1. Registration Phase
Initially, GWN is equipped with an identity and its own secret key . The registration phase is further divided into sensor node registration and user registration.
Sensor Node Registration Phase. Each sensor node chooses an identity and sends to GWN via a secure channel. Then GWN decides to deploy it in a sensor set numbered and computes the secret key . Finally, is injected to the memory of and is stored in the database of GWN.
User Registration Phase. In this phase, first selects an identity , a password , and a nonce , and then
(1) computes ;
(2) GWN: ;
(3) GWN checks if has already existed in the database. If so, it denies the registration request. Otherwise, GWN chooses a pseudoidentity and computes and and then stores in database;
(4) GWN : a smart card contains sensitive parameters ;
(5) after receiving the message, computes and inserts it into .
4.1.2. Login and Authentication Phase
conducts the following procedures to access sensitive information of the target sensor :
(1) inputs and to the smart card. Then computes and . chooses a random number and the required sensor node and further computes , , , and .
(2) GWN: .
(3) When receiving the message from , GWN first checks if is correct. If so, GWN computes , , and and verifies whether is in the database and . If either of the two verifications does not hold, GWN will terminate the session. Otherwise, GWN searches from the database, generates a random number , and computes , , , and .
(4) GWN .
(5) Once receiving the message, the corresponding node checks if is correct and computes and . Then verifies whether . If either is incorrect, rejects the session. Otherwise, generates and computes , , and .
(6) GWN: .
(7) Once received the response message, GWN computes , and checks whether . If so, GWN chooses a new pseudoidentity and calculates , , , , and .
(8) GWN .
(9) When receiving the response message, computes , , , and and verifies whether . If it is equal, computes and replaces with .
4.2. Cryptanalysis of Wu et al.’s Scheme
Due to its simplicity and admirable provision of user anonymity, Wu et al.’s scheme  exhibits great application prospects, and yet there are still some security pitfalls being overlooked by Wu et al. In the following, we will demonstrate that Wu et al.’s scheme  has some user friendliness issue and fails to achieve the critical property of forward security.
4.2.1. No Provision of User Friendliness
According to the collected data from Dashlane , “we are online hoarders” that the average user maintains over 107 accounts registered to one email address and this figure will rise to 207 by 2020. This statistical shows that users are creating and virtually stashing more online account information than ever, which leads to an insanely high number of accounts to manage. In that case, freely password change is a recommended practice, for users have to reset a forgotten password (an average of 37 accounts ) and the fixed password is definitely vulnerable. Moreover, users may make a slip in writing passwords or identities; the rapid response and decisive action are quite necessary for a user friendly authentication protocol.
Early in 1968, Robert Miller  published a classic paper about response time in man-computer conversational transactions, which pointed out that “response times exceed 10 seconds will completely lose the user’s attention”. In this way, locally secure password change, i.e., providing an explicit and secure process to verify the correctness of user-keyed password in smart card, is essential. That is, the smart card has no need to interact with remote server in user input and password changing phases. However, as stated above, both Li et al.’s scheme  and Amin et al.’s scheme  provide local password change, but their strategies introduce new vulnerabilities-offline dictionary attack.
Back to Wu et al.’s scheme , there is no verifier in the smart card, which means their scheme even cannot provide timely detection mechanism and reasonable password change. Fortunately, Wang et al.  introduced a “fuzzy verifier” technique to effectively solve this security-usability issue. In the following, we will take Wu et al.’s scheme  as an example to show this strategy. Firstly, submits to GWN in the registration phase. Then GWN computes mod and stores it in ’s smart card, where denotes the size of pool and . Assume and [29, 30], we can be assured that there have the possibilities of identity and password pairs to thwart the adversary from guessing out the correct password.
The same considerations can also be applied to Li et al.’s scheme  and Amin et al.’s scheme . The large-scale candidates will effectively frustrate from random guessing the password by a brute force method as well as providing a timely detection of the mistyped identity or password.
4.2.2. The Violation of Forward Secrecy
Forward secrecy is an important property, for the unattended environment and security-critical applications in wireless sensor networks [7, 11]. In , Wu et al. explicitly stated that “the sensor nodes may be captured by the intruder”, which accords with assumption (4) made in Section 2.2. Under this statement, we find that Wu et al.’s scheme cannot achieve the forward secrecy. Once a sensor node has been compromised, the stored information might be obtained by and the following attacks can be launched.
Step 1. Intercept the message sending from to GWN and the message sending from GWN to .
Step 2. Compute , , where is extracted from the compromised node .
Step 3. Intercept the message sending from GWN to .
Step 4. Compute .
Step 5. Compute the session key .
The above attack demonstrates that once a sensor node has been captured, the previous sessions might be decoded. This is the same failure with Li et al.’s scheme  and Amin et al.’s scheme . Besides the above two techniques (ECC cryptosystem and chaotic maps), we also suggest employing some other public-key cryptography techniques, such as Pairing  and RSA cryptosystem. Note that when using RSA cryptosystem to achieve forward secrecy, a new temporary RSA key must be generated by user side for each session .
To demonstrate the necessity and effectiveness of our suggestions, we provide a comparison of 10 recently proposed schemes by assessing whether they achieve forward secrecy and what main technology do they use. The result are shown in Table 2. One can see that only Das et al.’s scheme  successfully provides forward secrecy. This failure is mainly due to the fact that half of them (i.e., [8, 9, 51, 54]) only use Hash operation that are virtually impossible to provide forward secrecy (“PFS principle” ), yet the other 4 schemes (i.e., [25, 45, 50, 55]) that make use of public-key techniques (e.g., ECC, Chaotic maps, RSA) violate the principle that the random numbers must be generated by and separately and cannot be transmitted over the public channel.
. : one-time hash operation time; : elliptic curve point multiplication computation time; : running time of chaotic maps; : time for modular multiplication/division.
. means the corresponding scheme fails to achieve this property; CM denotes chaotic maps; PFS denotes perfect forward secrecy.
In this paper, we first analyze three state-of-the-art authentication schemes presented by Li et al., Amin et al., and Wu et al., which are mainly applied to realize real-time data access for security-critical wireless sensor networks. We demonstrate that although their schemes are equipped with formal proof, they still suffer from smart card loss attack and fail to achieve some important properties of forward secrecy, user anonymity, and user friendliness. Our cryptanalysis results discourage the practical application of these three schemes and reveal some challenges in designing a robust scheme for WSNs. We then suggest several possible countermeasures on account of their weaknesses and provide a comparison of 10 representative schemes in terms of forward secrecy and key technology to demonstrate the necessity of our suggestions. For the future work, a natural direction is to employ our recommended technologies and countermeasures to design robust and efficient schemes for WSNs.
Data sharing is not applicable to this article as no new data were created or analyzed in this study.
Conflicts of Interest
The authors have declared that no conflicts of interest exist.
This research was partially supported by the National Natural Science Foundation of China (NSFC) under Grants no. 61472016 and no. 61772548, the National Key R&D Program of China under Grants no. 2016YFB0800603 and no. 2017YFB1200700, and the Foundation of Science and Technology on Information Assurance Laboratory No. KJ-17-001.
- K.-A. Shim, “BASIS: a practical multi-user broadcast authentication scheme in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 7, pp. 1545–1554, 2017.
- J.-H. Bang, Y.-J. Cho, and K. Kang, “Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a hidden semi-Markov model,” Computers & Security, vol. 65, pp. 108–120, 2017.
- D. He, S. Zeadally, L. Wu, and H. Wang, “Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography,” Computer Networks, vol. 128, pp. 154–163, 2017.
- E. C. Whitman, “Sosus the 'secret weapon' of undersea surveillance,” Undersea Warfare, vol. 7, no. 2, 2005.
- C. M. Talbot, M. A. Temple, T. J. Carbino, and J. A. Betances, “Detecting rogue attacks on commercial wireless Insteon home automation systems,” Computers & Security, vol. 74, pp. 296–307, 2017.
- X. Li, M. H. Ibrahim, S. Kumari, A. K. Sangaiah, V. Gupta, and K. R. Choo, “Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks,” Computer Networks, vol. 129, pp. 429–443, 2017.
- D. Wang and P. Wang, “On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions,” Computer Networks, vol. 73, pp. 41–57, 2014.
- R. Amin, N. Kumar, G. P. Biswas, R. Iqbal, and V. Chang, “A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment,” Future Generation Computer Systems, vol. 78, pp. 1005–1019, 2018.
- F. Wu, X. Li, A. K. Sangaiah et al., “A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks,” Future Generation Computer Systems, 2017.
- D. Wang and P. Wang, “Two birds with one stone: two-factor authentication with security beyond conventional bound,” IEEE Transactions on Dependable and Secure Computing, 2016.
- Q. Jiang, J. Ma, F. Wei, Y. Tian, J. Shen, and Y. Yang, “An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks,” Journal of Network and Computer Applications, vol. 76, pp. 37–48, 2016.
- X. Huang, X. Chen, J. Li, Y. Xiang, and L. Xu, “Further observations on smart-card-based password-authenticated key agreement in distributed systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7, pp. 1767–1775, 2014.
- K. H. M. Wong, Z. Yuan, C. Jiannong, and W. Shengwei, “A dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, pp. 244–251, Taichung, Taiwan, June 2006.
- H. R. Tseng, R. H. Jan, and W. Yang, “An improved dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07), pp. 986–990, November 2007.
- M. L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1086–1090, 2009.
- M. K. Khan, S. K. Kim, and K. Alghathbar, “Cryptanalysis and security enhancement of a more efficient secure dynamic id-based remote user authentication scheme,” Computer Communications, vol. 34, no. 3, pp. 305–309, 2011.
- T.-H. Chen and W.-K. Shih, “A robust mutual authentication protocol for wireless sensor networks,” ETRI Journal, vol. 32, no. 5, pp. 704–712, 2010.
- H.-L. Yeh, T.-H. Chen, P.-C. Liu, T.-H. Kim, and H.-W. Wei, “A secured authentication protocol for wireless sensor networks using elliptic curves cryptography,” Sensors, vol. 11, no. 5, pp. 4767–4779, 2011.
- W. B. Shi and P. Gong, “A new user authentication protocol for wireless sensor networks using elliptic curves cryptography,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 730831, 7 pages, 2013.
- B. Vaidya, D. Makrakis, and H. T. Mouftah, “Improved two-factor user authentication in wireless sensor networks,” in Proceedings of the 6th Annual IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '10), pp. 600–606, October 2010.
- M. S. Farash, M. Turkanović, S. Kumari, and M. Hölbl, “An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment,” Ad Hoc Networks, vol. 36, pp. 152–176, 2016.
- Y. Choi, D. Lee, J. Kim, J. Jung, J. Nam, and D. Won, “Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography,” Sensors, vol. 14, no. 6, pp. 10081–10106, 2014.
- K. Xue, C. Ma, P. Hong, and R. Ding, “A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 316–323, 2013.
- D. He, N. Kumar, and N. Chilamkurti, “A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks,” Information Sciences, vol. 321, Article ID 11403, pp. 263–277, 2015.
- X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, and K. R. Choo, “A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments,” Journal of Network and Computer Applications, vol. 103, pp. 194–204, 2018.
- C.-G. Ma, D. Wang, and S.-D. Zhao, “Security flaws in two improved remote user authentication schemes using smart cards,” International Journal of Communication Systems, vol. 27, no. 10, pp. 2215–2227, 2014.
- J. Zhao, “On resilience and connectivity of secure wireless sensor networks under node capture attacks,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 557–571, 2017.
- X. Huang, Y. Xiang, E. Bertino, J. Zhou, and L. Xu, “Robust multi-factor authentication for fragile communications,” IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 6, pp. 568–581, 2014.
- D. Wang, Z. Zhang, P. Wang, J. Yan, and X. Huang, “Targeted online password guessing: an underestimated threat,” in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16), pp. 1242–1254, October 2016.
- D. Wang, H. Cheng, P. Wang, X. Huang, and G. Jian, “Zipfs law in passwords,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2776–2791, 2017.
- A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proceedings of the 6th ACM Conference on Computer and Communications Security (ACM CCS '99), pp. 28–36, November 1999.
- L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), pp. 41–47, Washington, DC, USA, November 2002.
- T. M. Vu, R. Safavi-Naini, and C. Williamson, “Securing wireless sensor networks against large-scale node capture attacks,” in Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS '10), pp. 112–123, April 2010.
- M. Turkanović, B. Brumen, and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Networks, vol. 20, pp. 96–112, 2014.
- M. Burrows, M. Abad, and M. Needham, “A logic of authentication,” Proceedings of the Royal Society A Mathematical, Physical and Engineering Sciences, vol. 426, no. 1871, pp. 233–271, 1989.
- V. Odelu, A. K. Das, and A. Goswami, “A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1953–1966, 2015.
- K. Xue, P. Hong, and C. Ma, “A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture,” Journal of Computer and System Sciences, vol. 80, no. 1, pp. 195–206, 2014.
- M.-C. Chuang and M. C. Chen, “An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics,” Expert Systems with Applications, vol. 41, no. 4, pp. 1411–1418, 2014.
- C. Tang and D. O. Wu, “Mobile privacy in wireless networks-revisited,” IEEE Transactions on Wireless Communications, vol. 7, no. 3, pp. 1035–1042, 2008.
- R. Ali, A. K. Pal, S. Kumari, M. Karuppiah, and M. Conti, “A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring,” Future Generation Computer Systems, vol. 84, pp. 200–215, 2018.
- J. Jung, J. Moon, D. Lee, and D. Won, “Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks,” Sensors, vol. 17, no. 3, p. 644, 2017.
- M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo, “Design of secure user authenticated key management protocol for generic iot networks,” IEEE Internet of Things Journal, vol. 5, no. 1, pp. 269–282, 2018.
- M. L. Das, A. Saxena, and V. P. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629–631, 2004.
- P. K. Dhillon and S. Kalra, “Secure multi-factor remote user authentication scheme for internet of things environments,” International Journal of Communication Systems, vol. 30, no. 16, pp. 1–20, 2017.
- S. Roy, S. Chatterjee, A. K. Das, S. Chattopadhyay, S. Kumari, and M. Jo, “Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things,” IEEE Internet of Things Journal, 2017.
- Y. Xiao, M. Li, S. Chen, and Y. Zhang, “Stacco: differentially analyzing side-channel traces for detecting ssl/tls vulnerabilities in secure enclaves,” in Proceedings of the ACM SIGSAC Conference, pp. 859–874, Dallas, TX, USA, October 2017.
- N. Veyrat-Charvillon and F. Standaert, “Generic side-channel distinguishers: improvements and limitations,” in Advances in Cryptology—CRYPTO 2011, vol. 6841 of Lecture Notes in Computer Science, pp. 354–372, Springer Berlin Heidelberg, 2011.
- Y. Zhou, Y. Yu, F.-X. Standaert, and J.-J. Quisquater, “On the need of physical security for small embedded devices: a case study with COMP128-1 implementations in SIM cards,” in Proceedings of the FC, vol. 7859, pp. 230–238, 2013.
- G. Chalupar, S. Peherstorfer, E. Poll, and J. De Ruiter, “Automated reverse engineering using lego,” in Proceedings of the 8th USENIX WOOT, vol. 14, pp. 1–10, 2014.
- J. Moon, Y. Lee, J. Kim, and D. Won, “Improving an anonymous and provably secure authentication protocol for a mobile user,” Security and Communication Networks, vol. 2017, Article ID 1378128, 13 pages, 2017.
- J. Srinivas, S. Mukhopadhyay, and D. Mishra, “Secure and efficient user authentication scheme for multi-gateway wireless sensor networks,” Ad Hoc Networks, vol. 54, pp. 147–169, 2017.
- A. K. Das, S. Kumari, V. Odelu, X. Li, F. Wu, and X. Huang, “Provably secure user authentication and key agreement scheme for wireless sensor networks,” Security and Communication Networks, vol. 9, no. 16, pp. 3670–3687, 2016.
- C.-C. Chang and H.-D. Le, “A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 357–366, 2016.
- B. Vaidya, D. Makrakis, and H. Mouftah, “Two-factor mutual authentication with key agreement in wireless sensor networks,” Security and Communication Networks, vol. 9, no. 2, pp. 171–183, 2016.
- V. Odelu, A. K. Das, and A. Goswami, “An effective and robust secure remote user authenticated key agreement scheme using smart cards in wireless communication systems,” Wireless Personal Communications, vol. 84, no. 4, pp. 2571–2598, 2015.
- T. L. Bras, “Online overload its worse than you thought,” July 2015, https://bit.ly/2IjgkGL.
- R. B. Miller, “Response time in man-computer conversational transactions,” in Proceedings of the Fall Joint Computer Conference (AFIPS '68), pp. 267–277, San Francisco, Calif, USA, December 1968.
- D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology—CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, Springer, 2001.
- D. Park, C. Boyd, and S. Moon, “Forward secrecy and its application to future mobile communications security,” in Public Key Cryptography, vol. 1751 of Lecture Notes in Computer Science, pp. 433–445, Springer Berlin Heidelberg, 2000.
Copyright © 2018 Wenting Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.