Cargando…

Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol

Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as Internet of sensors (IoS), Internet of vehicles (IoV), healthcare monitoring, and so on. As wireless sensor nodes have constrained computing, storage and communication capabilities, designing energy-e...

Descripción completa

Detalles Bibliográficos
Autores principales: Aghili, Seyed Farhad, Mala, Hamid, Peris-Lopez, Pedro
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6264007/
https://www.ncbi.nlm.nih.gov/pubmed/30380595
http://dx.doi.org/10.3390/s18113663
_version_ 1783375396732928000
author Aghili, Seyed Farhad
Mala, Hamid
Peris-Lopez, Pedro
author_facet Aghili, Seyed Farhad
Mala, Hamid
Peris-Lopez, Pedro
author_sort Aghili, Seyed Farhad
collection PubMed
description Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as Internet of sensors (IoS), Internet of vehicles (IoV), healthcare monitoring, and so on. As wireless sensor nodes have constrained computing, storage and communication capabilities, designing energy-efficient authentication protocols is a very important issue in wireless sensor network security. Recently, Amin et al. presented an untraceable and anonymous three-factor authentication (3FA) scheme for HWSNs and argued that their protocol is efficient and can withstand the common security threats in this sort of networks. In this article, we show how their protocol is not immune to user impersonation, de-synchronization and traceability attacks. In addition, an adversary can disclose session key under the typical assumption that sensors are not tamper-resistant. To overcome these drawbacks, we improve the Amin et al.’s protocol. First, we informally show that our improved scheme is secure against the most common attacks in HWSNs in which the attacks against Amin et al.’s protocol are part of them. Moreover, we verify formally our proposed protocol using the BAN logic. Compared with the Amin et al.’s scheme, the proposed protocol is both more efficient and more secure to be employed which renders the proposal suitable for HWSN networks.
format Online
Article
Text
id pubmed-6264007
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-62640072018-12-12 Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol Aghili, Seyed Farhad Mala, Hamid Peris-Lopez, Pedro Sensors (Basel) Article Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as Internet of sensors (IoS), Internet of vehicles (IoV), healthcare monitoring, and so on. As wireless sensor nodes have constrained computing, storage and communication capabilities, designing energy-efficient authentication protocols is a very important issue in wireless sensor network security. Recently, Amin et al. presented an untraceable and anonymous three-factor authentication (3FA) scheme for HWSNs and argued that their protocol is efficient and can withstand the common security threats in this sort of networks. In this article, we show how their protocol is not immune to user impersonation, de-synchronization and traceability attacks. In addition, an adversary can disclose session key under the typical assumption that sensors are not tamper-resistant. To overcome these drawbacks, we improve the Amin et al.’s protocol. First, we informally show that our improved scheme is secure against the most common attacks in HWSNs in which the attacks against Amin et al.’s protocol are part of them. Moreover, we verify formally our proposed protocol using the BAN logic. Compared with the Amin et al.’s scheme, the proposed protocol is both more efficient and more secure to be employed which renders the proposal suitable for HWSN networks. MDPI 2018-10-29 /pmc/articles/PMC6264007/ /pubmed/30380595 http://dx.doi.org/10.3390/s18113663 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Aghili, Seyed Farhad
Mala, Hamid
Peris-Lopez, Pedro
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
title Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
title_full Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
title_fullStr Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
title_full_unstemmed Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
title_short Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
title_sort securing heterogeneous wireless sensor networks: breaking and fixing a three-factor authentication protocol
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6264007/
https://www.ncbi.nlm.nih.gov/pubmed/30380595
http://dx.doi.org/10.3390/s18113663
work_keys_str_mv AT aghiliseyedfarhad securingheterogeneouswirelesssensornetworksbreakingandfixingathreefactorauthenticationprotocol
AT malahamid securingheterogeneouswirelesssensornetworksbreakingandfixingathreefactorauthenticationprotocol
AT perislopezpedro securingheterogeneouswirelesssensornetworksbreakingandfixingathreefactorauthenticationprotocol