Abstract

Wireless sensor network has been widely used and plays a vital role in the Internet of Things, smart cities, military, and other fields, and its security has also attracted the attention of many researchers. In view of the security defects in Shin and Kwon’s scheme such as failure to provide three-factor security, lack of anonymity and untraceability, user impersonation attack, desynchronization attack and privileged insider attack, we suggest an improved provably secure three-factor user authentication scheme based on Chebyshev chaotic mapping for wireless sensor network, which employs fuzzy verifier technique to prevent attacker from offline guessing attack on user identity and password when the stolen/lost smartcard is acquired by the attacker. During the authentication phase, a dynamic identity mechanism is used to ensure the anonymity of the user and sensor to prevent desynchronization attack, and the Chebyshev chaotic mapping is introduced to improve security and reduce computation overhead. The rigorous security proof under the random oracle model and the formal verification via ProVerif show that our protocol overcomes the weaknesses in Shin and Kwon’s scheme. In addition, by comparing the performance of our proposed scheme with that of others, we demonstrate that our proposal not only solves the security risks of Shin and Kwon.’s protocol, but also achieves a better tradeoff between security and efficiency, therefore, it is more suitable for user authentication in wireless sensor network environments.

Highlights

  • With the rapid development of network communication technology, computer intelligence and embedded technology, wireless sensor network (WSN) have been widely used in military surveillance, smart homes, industrial automation, medical care and other important fields, which make information processing in related fields more efficient and intelligent [1]

  • Because of the scanty resources of wireless sensors, the security technology in traditional networks is difficult to be directly applied to WSN

  • Many researchers have presented a considerable number of WSN authentication protocols [3,4,5,6,7] to verify the identity of users and negotiate a VOLUME XX, 2017

Read more

Summary

INTRODUCTION

With the rapid development of network communication technology, computer intelligence and embedded technology, wireless sensor network (WSN) have been widely used in military surveillance, smart homes, industrial automation, medical care and other important fields, which make information processing in related fields more efficient and intelligent [1]. To address these issues, many researchers have presented a considerable number of WSN authentication protocols [3,4,5,6,7] to verify the identity of users and negotiate a VOLUME XX, 2017. Shin and Kwon claimed that their new protocol eliminated the security flaws in the previous scheme and provided security proof that it is capable of resisting active and passive attacks. Because chaotic mapping based cryptography requires less computation time and provides higher security than other public key cryptography [43], the improved scheme proposed in this paper utilizes Chebyshev chaotic mapping to solve the problems in Shin and Kwon’s scheme and improve its security and efficiency. We assess the improved scheme by comparing with related schemes to show that our scheme acquires a better tradeoff between performance and security requirements

PAPER OUTLINE The rest of our paper is organized as follows
RELATED WORK
PRELIMINARIES
REVIEW AND CRYPTANALYSIS OF SHIN AND KWON’S SCHEME
THE PROPOSED SCHEME
USER REGISTRATION Step 1
FORMAL SECURITY PROOF
VIII CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call