Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things

To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). Session key establishment between the sensor node and the user is also required for...

Full description

Bibliographic Details
Main Authors: Anup Kumar Maurya, V. N. Sastry
Format: Article
Language:English
Published: MDPI AG 2017-10-01
Series:Information
Subjects:
Online Access:https://www.mdpi.com/2078-2489/8/4/136
_version_ 1819078238460182528
author Anup Kumar Maurya
V. N. Sastry
author_facet Anup Kumar Maurya
V. N. Sastry
author_sort Anup Kumar Maurya
collection DOAJ
description To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015), Choi et al.’s scheme (given in 2016), and Park et al.’s scheme (given in 2016). The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN) logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT.
first_indexed 2024-12-21T19:09:55Z
format Article
id doaj.art-24116e2b4f57494b855a85d9f957ded0
institution Directory Open Access Journal
issn 2078-2489
language English
last_indexed 2024-12-21T19:09:55Z
publishDate 2017-10-01
publisher MDPI AG
record_format Article
series Information
spelling doaj.art-24116e2b4f57494b855a85d9f957ded02022-12-21T18:53:14ZengMDPI AGInformation2078-24892017-10-018413610.3390/info8040136info8040136Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of ThingsAnup Kumar Maurya0V. N. Sastry1Center for Mobile Banking, Institute for Development and Research in Banking Technology, Hyderabad 500057, IndiaCenter for Mobile Banking, Institute for Development and Research in Banking Technology, Hyderabad 500057, IndiaTo improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015), Choi et al.’s scheme (given in 2016), and Park et al.’s scheme (given in 2016). The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN) logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT.https://www.mdpi.com/2078-2489/8/4/136Wireless Sensor Networks(WSNs)Internet of Things (IoT)user authenticationsession keysmart cardfuzzy extractorhash function
spellingShingle Anup Kumar Maurya
V. N. Sastry
Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things
Information
Wireless Sensor Networks(WSNs)
Internet of Things (IoT)
user authentication
session key
smart card
fuzzy extractor
hash function
title Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things
title_full Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things
title_fullStr Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things
title_full_unstemmed Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things
title_short Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things
title_sort fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and internet of things
topic Wireless Sensor Networks(WSNs)
Internet of Things (IoT)
user authentication
session key
smart card
fuzzy extractor
hash function
url https://www.mdpi.com/2078-2489/8/4/136
work_keys_str_mv AT anupkumarmaurya fuzzyextractorandellipticcurvebasedefficientuserauthenticationprotocolforwirelesssensornetworksandinternetofthings
AT vnsastry fuzzyextractorandellipticcurvebasedefficientuserauthenticationprotocolforwirelesssensornetworksandinternetofthings