Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks

In wireless sensor networks, user authentication scheme is a critical and important security issue to prevent adversary’s illegal approach to wireless sensors. After Das introduce a user authentication scheme for wireless sensor networks, various studies

  • PDF / 769,173 Bytes
  • 7 Pages / 439.37 x 666.14 pts Page_size
  • 9 Downloads / 256 Views

DOWNLOAD

REPORT


Abstract In wireless sensor networks, user authentication scheme is a critical and important security issue to prevent adversary’s illegal approach to wireless sensors. After Das introduce a user authentication scheme for wireless sensor networks, various studies had proceeded to proposed more secure and efficient authentication scheme but many schemes had security problem on smart card attack. So Chem et al. suggested a secure user authentication scheme against smart card loss attack using symmetric key techniques but this scheme does not still resolve some security vulnerability. So by the cryptanalysis, this paper shows that Chem et al‘s scheme has problems on perfect forward secrecy, session key exposure by gateway node, anonymity, and the password check. Keywords User authentication scheme · Cryptanalysis · Wireless Sensor Networks

1

Introduction

Recently, wireless sensor networks (WSNs) have been substantially investigated by researches. It can observe various hazardous conditions, such as volcanic Y. Choi · D. Won() Department of Computer Engineering, Sungkyunkwan University, 2066 Seoburo, Suwon, Gyeonggido 440-746, Korea e-mail: {yschoi,dhwon}@security.re.kr Y. Lee Department of Cyber Investigation Police, Howon University, 64 Howon University 3 Gil, Impi-Myeon, Gunsan-Si, Jeonrabuk-Do 573-718, Korea e-mail: [email protected] This research was supported by Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Science, ICT & Future Planning (NRF-2014R1A1A2002775) © Springer Science+Business Media Singapore 2015 D.-S. Park et al. (eds.), Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering 373, DOI: 10.1007/978-981-10-0281-6_2

7

8

Y. Choi et al.

temperature, battlefield surveillance[1]. To use more secure and efficient communication on WSNs, various studies on user authentication had progressed from previous times. Das introduced a two-factor user authentication scheme firstly using password and smart card[2]. Since then, various researchers analyzed Das’s authentication scheme and showed the problems of the scheme, and proposes more secure and efficient user authentication scheme for WSNs. Nyang and Lee[3] pointed out that Das’s scheme has vulnerability on an offline password guessing attack and node compromise attack. Khan-Alghathbar showed Das’s scheme is insecure to gateway nodes bypass attack[4]. After analyzing Das’s scheme and Khan-Alghathbar’s scheme, Vaidya et al. point out that they have security problem attacks such as smart card loss attacks[5]. To resolve the smart card attack such as offline password guessing attack, Yuan proposed biometric-based authentication scheme[6], and Yeh et al. improve Yuan’s scheme[7] and Choi et al. proposed security enhanced scheme using elliptic curve cryptography for WSNs to solve Yuan and Yeh et al.’s security problem[8]. Chen et al. proposed a secure user authentication scheme against smart card loss attack for WSNs using symmetric key techniques. This schem