Cargando…

Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many re...

Descripción completa

Detalles Bibliográficos
Autores principales: Nam, Junghyun, Choo, Kim-Kwang Raymond, Han, Sangchul, Kim, Moonseong, Paik, Juryon, Won, Dongho
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4389980/
https://www.ncbi.nlm.nih.gov/pubmed/25849359
http://dx.doi.org/10.1371/journal.pone.0116709
_version_ 1782365631615598592
author Nam, Junghyun
Choo, Kim-Kwang Raymond
Han, Sangchul
Kim, Moonseong
Paik, Juryon
Won, Dongho
author_facet Nam, Junghyun
Choo, Kim-Kwang Raymond
Han, Sangchul
Kim, Moonseong
Paik, Juryon
Won, Dongho
author_sort Nam, Junghyun
collection PubMed
description A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).
format Online
Article
Text
id pubmed-4389980
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-43899802015-04-21 Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation Nam, Junghyun Choo, Kim-Kwang Raymond Han, Sangchul Kim, Moonseong Paik, Juryon Won, Dongho PLoS One Research Article A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). Public Library of Science 2015-04-07 /pmc/articles/PMC4389980/ /pubmed/25849359 http://dx.doi.org/10.1371/journal.pone.0116709 Text en © 2015 Nam et al http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited.
spellingShingle Research Article
Nam, Junghyun
Choo, Kim-Kwang Raymond
Han, Sangchul
Kim, Moonseong
Paik, Juryon
Won, Dongho
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
title Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
title_full Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
title_fullStr Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
title_full_unstemmed Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
title_short Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
title_sort efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4389980/
https://www.ncbi.nlm.nih.gov/pubmed/25849359
http://dx.doi.org/10.1371/journal.pone.0116709
work_keys_str_mv AT namjunghyun efficientandanonymoustwofactoruserauthenticationinwirelesssensornetworksachievinguseranonymitywithlightweightsensorcomputation
AT chookimkwangraymond efficientandanonymoustwofactoruserauthenticationinwirelesssensornetworksachievinguseranonymitywithlightweightsensorcomputation
AT hansangchul efficientandanonymoustwofactoruserauthenticationinwirelesssensornetworksachievinguseranonymitywithlightweightsensorcomputation
AT kimmoonseong efficientandanonymoustwofactoruserauthenticationinwirelesssensornetworksachievinguseranonymitywithlightweightsensorcomputation
AT paikjuryon efficientandanonymoustwofactoruserauthenticationinwirelesssensornetworksachievinguseranonymitywithlightweightsensorcomputation
AT wondongho efficientandanonymoustwofactoruserauthenticationinwirelesssensornetworksachievinguseranonymitywithlightweightsensorcomputation