Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3625403.3625435acmotherconferencesArticle/Chapter ViewAbstractPublication PagesadmitConference Proceedingsconference-collections
research-article

An improved chaotic-map based two-factor authentication and key agreement protocol for WSNs

Published: 17 November 2023 Publication History

Abstract

The widespread use of wireless sensor networks has led to an increasing focus on their security. Although access control and other technologies are used to prevent the data from being revealed, many existing authentication key agreement protocols are not well suited to the requirements of the wireless sensor networks. In this paper, we point out the drawbacks of Li et al.’s protocol, and design an anonymous two-factor protocol combing the extended chebyshev chaotic map and fuzzy-verifier. The protocol adopts the lightweight chaotic map rather than the computationally expensive ECC operation, which can achieve high security with reasonable computation cost. In addition, formal security analysis with BAN logic and the overheads comparison are demonstrated the protocol is practical in the wireless sensor network environments.

References

[1]
Ruhul Amin, S.K. Hafizul Islam, Neeraj Kumar, and Kim-Kwang Raymond Choo. 2018. An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. Journal of Network and Computer Applications 104 (2018), 133–144. https://doi.org/10.1016/j.jnca.2017.12.012
[2]
Michael Burrows, Martin Abadi, and Roger Needham. 1990. A Logic of Authentication. ACM Trans. Comput. Syst. 8, 1 (feb 1990), 18–36. https://doi.org/10.1145/77648.77649
[3]
Tien-Ho Chen and Wei-Kuan Shih. 2010. A Robust Mutual Authentication Protocol for Wireless Sensor Networks. ETRI Journal 32, 5 (2010), 704–712. https://doi.org/10.4218/etrij.10.1510.0134 arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.4218/etrij.10.1510.0134
[4]
Manik Lal Das. 2009. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8, 3 (2009), 1086–1090. https://doi.org/10.1109/TWC.2008.080128
[5]
Rong Fan, Dao-jing He, Xue-zeng Pan, and Ling-di Ping. 2011. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University SCIENCE C 12, 7 (2011), 550–560. https://doi.org/10.1631/jzus.C1000377
[6]
Cheng Guo and Chin-Chen Chang. 2013. Chaotic maps-based password-authenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation 18, 6 (2013), 1433–1440. https://doi.org/10.1016/j.cnsns.2012.09.032
[7]
Xianfeng Guo and Jiashu Zhang. 2010. Secure group key agreement protocol based on chaotic Hash. Information Sciences 180, 20 (2010), 4069–4074. https://doi.org/10.1016/j.ins.2010.06.013
[8]
Xinhong Hao, Jiantao Wang, Qinghai Yang, Xiaopeng Yan, and Ping Li. 2013. A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 37, 2 (2013), 9919. https://doi.org/10.1007/s10916-012-9919-y
[9]
Jun He, Zheng Yang, Jianxun Zhang, Wanping Liu, and Chao Liu. 2018. On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. International Journal of Distributed Sensor Networks 14, 1 (2018), 1–11. Issue No.1.
[10]
Qi Jiang, Jianfeng Ma, Xiang Lu, and Youliang Tian. 2014. Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. Journal of Medical Systems 38, 2 (2014), 12. https://doi.org/10.1007/s10916-014-0012-6
[11]
Qi Jiang, Jianfeng Ma, Xiang Lu, and Youliang Tian. 2015. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 8, 6 (2015), 1070–1081. https://doi.org/10.1007/s12083-014-0285-z
[12]
Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, and Yuanyuan Yang. 2016. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications 76 (2016), 37–48. https://doi.org/10.1016/j.jnca.2016.10.001
[13]
Qi Jiang, Jianfeng Ma, Chao Yang, Xindi Ma, Jian Shen, and Shehzad Ashraf Chaudhry. 2017. Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering 63 (2017), 182–195. https://doi.org/10.1016/j.compeleceng.2017.03.016
[14]
Muhammad Khurram Khan and Khaled Alghathbar. 2010. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’. Sensors 10, 3 (2010), 2450–2459. https://doi.org/10.3390/s100302450
[15]
Ljupco Kocarev and Shiguo Lian. 2011. Chaos-Based Cryptography: Theory, Algorithms and Applications. Studies in Computational Intelligence, Vol. 354. Springer Berlin / Heidelberg, Berlin, Heidelberg.
[16]
Pardeep Kumar, Amlan Jyoti Choudhury, Mangal Sain, Sang-Gon Lee, and Hoon-Jae Lee. 2011. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks. Sensors 11, 5 (2011), 5020–5046. https://doi.org/10.3390/s110505020
[17]
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, and Song-Jhih Chen. 2016. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems. Journal of Medical Systems 40, 11 (2016), 233. https://doi.org/10.1007/s10916-016-0586-2
[18]
Fengyin Li, Xinying Yu, Yang Cui, Siqi Yu, Yuhong Sun, Yilei Wang, and Huiyu Zhou. 2022. An anonymous authentication and key agreement protocol in smart living. Computer Communications 186 (2022), 110–120.
[19]
Wenting Li, Haibo Cheng, and Ping Wang. 2019. Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things. In 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 1–8. https://doi.org/10.1109/CyberSecPODS.2019.8885375
[20]
Xiong Li, Jianwei Niu, Md Zakirul Alam Bhuiyan, Fan Wu, Marimuthu Karuppiah, and Saru Kumari. 2018. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3599–3609. https://doi.org/10.1109/TII.2017.2773666
[21]
Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Arun Kumar Sangaiah, and Kim-Kwang Raymond Choo. 2018. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications 103 (2018), 194–204. https://doi.org/10.1016/j.jnca.2017.07.001
[22]
Xiong Li, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, and Minho Jo. 2018. A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Generation Computer Systems 84 (2018), 149–159. https://doi.org/10.1016/j.future.2017.08.029
[23]
R. Madhusudhan and Chaitanya S. Nayak. 2019. A robust authentication scheme for telecare medical information systems. Multimedia Tools and Applications 78, 11 (2019), 15255–15273. https://doi.org/10.1007/s11042-018-6884-6
[24]
Sandip Roy, Santanu Chatterjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, and Minho Jo. 2018. Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things. IEEE Internet of Things Journal 5, 4 (2018), 2884–2895. https://doi.org/10.1109/JIOT.2017.2714179
[25]
Jangirala Srinivas, Ashok Kumar Das, Mohammad Wazid, and Neeraj Kumar. 2020. Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing 17, 6 (2020), 1133–1146. https://doi.org/10.1109/TDSC.2018.2857811
[26]
Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong, and Isao Echizen. 2015. Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment. In ICT Systems Security and Privacy Protection, Hannes Federrath and Dieter Gollmann (Eds.). Cham, 479–494.
[27]
H.-R. Tseng, R.-H. Jan, and W. Yang. 2009. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity. In 2009 IEEE International Conference on Communications. 1–6. https://doi.org/10.1109/ICC.2009.5198581
[28]
Gaurav Tyagi and Rahul Kumar. 2022. An improved multifactor user authentication scheme for wireless sensor networks. Wireless Personal Communications 123, 2 (2022), 1311–1343. https://doi.org/10.1007/s11277-021-09182-9
[29]
Ding Wang, Qianchen Gu, Haibo Cheng, and Ping Wang. 2016. The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (Xi’an, China) (ASIA CCS ’16). New York, NY, USA, 475–486. https://doi.org/10.1145/2897845.2897916
[30]
Ding Wang and Ping Wang. 2014. On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Computer Networks 73 (2014), 41–57. https://doi.org/10.1016/j.comnet.2014.07.010
[31]
Ding Wang and Ping Wang. 2016. Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE transactions on dependable and secure computing 15, 4 (2016), 708–722.
[32]
Ding Wang, Ping Wang, and Chenyu Wang. 2020. Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs. ACM Trans. Cyber-Phys. Syst. 4, 3, Article 30 (2020), 26 pages. https://doi.org/10.1145/3325130
[33]
Di Xiao, Xiaofeng Liao, and Shaojiang Deng. 2007. A novel key agreement protocol based on chaotic maps. Information Sciences 177, 4 (2007), 1136–1142. https://doi.org/10.1016/j.ins.2006.07.026
[34]
Di Xiao, Xiaofeng Liao, and Shaojiang Deng. 2008. Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Information Sciences 178, 6 (2008), 1598–1602. https://doi.org/10.1016/j.ins.2007.11.001
[35]
Kaiping Xue, Changsha Ma, Peilin Hong, and Rong Ding. 2013. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 36, 1 (2013), 316–323. https://doi.org/10.1016/j.jnca.2012.05.010
[36]
Liping Zhang, Shaohui Zhu, and Shanyu Tang. 2017. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme. IEEE Journal of Biomedical and Health Informatics 21, 2 (2017), 465–475. https://doi.org/10.1109/JBHI.2016.2517146
[37]
Xin Zhang and Fengtong Wen. 2019. An novel anonymous user WSN authentication for Internet of Things. Soft Computing 23, 14 (2019), 5683–5691. https://doi.org/10.1007/s00500-018-3226-6

Index Terms

  1. An improved chaotic-map based two-factor authentication and key agreement protocol for WSNs

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ADMIT '23: Proceedings of the 2023 2nd International Conference on Algorithms, Data Mining, and Information Technology
      September 2023
      227 pages
      ISBN:9798400707629
      DOI:10.1145/3625403
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 November 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Authentication
      2. Chaotic Map
      3. Fuzzy Verifier
      4. Wireless Sensor Networks

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      • Sichuan Science and Technology Program
      • Foundation of Science and Technology On Communication Security Laboratory of China

      Conference

      ADMIT 2023

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 27
        Total Downloads
      • Downloads (Last 12 months)19
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 13 Jan 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media