Wireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication networks, resource limitation, and unattended operation. As a result, various authentication schemes have been proposed to provide secure and efficient communication. He et al. suggested a robust biometrics-based user authentication scheme, but Yoon and Kim indicated that their scheme had several security vulnerabilities. The latter then proposed an advanced biometrics-based user authentication scheme; in this paper, we analyze this advanced scheme and perform a cryptanalysis. Our analysis shows that Yoon and Kim's scheme has various security weaknesses such as a biometric recognition error, a user verification problem, lack of anonymity and perfect forward secrecy, session key exposure by the gateway node, vulnerability to denial of service attacks, and a revocation problem. Therefore, we suggest countermeasures that can be implemented to solve these problems and then propose a security-enhanced biometrics-based user authentication scheme using fuzzy extraction that conforms to the proposed countermeasures. Finally, we conduct a security analysis for the proposed biometrics-based user authentication scheme.
1. Introduction
Nowadays, numerous physical, chemical, and biological sensors are deployed in wireless sensor network (WSN) environments for various applications. These sensors can monitor a variety of conditions, including temperature, pressure, military surveillance, and real-time traffic conditions. One benefit of WSNs is that the sensors can be easily deployed in various kinds of harsh environments. Therefore, there has been a remarkable increase in the interest in WSNs [1]. WSNs generally consist of gateways, users, and sensors, and communication security is a momentous concern in real-world applications. Various authentication schemes for WSNs have been proposed for ensuring secure communication.
To support confidentiality and authentication for sensor networks, Watro et al. introduced a user authentication scheme employing the RSA and DH algorithms for WSNs in 2004. Wong et al. proposed a dynamic user authentication scheme that used a hash function [2]. But Tseng et al. indicated that Wong et al.'s authentication scheme has vulnerability to replay, stolen-verifier, and forgery attacks [3–7]. Das proposed a two-factor user authentication scheme based on a password and smart card to improve the security in 2009. Das demonstrated his scheme to be secure against various real-time attacks [6]. However, He et al. indicated that Das's scheme has vulnerability to insider attacks and impersonation attacks and that no provision was available for users to change their passwords. And also He et al. proposed an improved two-factor scheme to solve these security problems [8]. Khan and Alghathbar demonstrated that Das's scheme did not provide mutual authentication, and it has vulnerability to gateway bypassing and privileged-insider attacks [9]. Chen and Shih indicated that Das's scheme did not provide mutual authentication between the gateway and the sensor, and Chen and Shih proposed a robust mutual authentication scheme for WSNs and claimed that their scheme provides greater security than Das's scheme [10]. In 2010, Yuan et al. [11] proposed a biometric-based user authentication scheme, but it was found to have various security problems. Yoon and Yoo pointed out that Yuan et al.'s scheme has vulnerability to insider, user impersonation, gateway node impersonation, and sensor node impersonation attacks. To address these problems, Yoon and Yoo proposed an improved user authentication scheme [12]. However, in 2012, He demonstrated that Yoon and Yoo scheme was still vulnerable to denial of service (DoS) and sensor impersonation attacks. The former then proposed an improved scheme to overcome these security problems [13].
In 2013, Yoon and Kim [14] indicated that even He et al.’ scheme had various security vulnerabilities such as poor repair-ability and vulnerability to user and sensor node impersonation attacks. The former then proposed an advanced biometrics-based user authentication scheme for WSNs. They demonstrated that their scheme was more effective and had stronger security than other related schemes [13, 14]. To verify the security of Yoon and Kim's advanced scheme, we analyzed their scheme and performed a security cryptanalysis. We found that it has various security problems, including a biometric recognition error, a user verification problem, lack of anonymity and perfect forward secrecy, session key exposure by the gateway node, vulnerability to DoS attacks, and a revocation problem. To solve these problems, we first suggest appropriate countermeasures and then propose a biometrics-based user authentication scheme using fuzzy extraction with improved security that conforms to the proposed countermeasures. Moreover, we also conduct a security analysis of 16 security properties for the proposed biometrics-based user authentication scheme.
The remainder of this paper is organized as follows. Section 2 describes some related work to understand this paper. Section 3 explains Yoon and Kim's authentication scheme, and Section 4 analyzes their scheme to discuss the inherent security problems. Section 5 explains countermeasures to solve these problems. Section 6 proposes the biometric-based authentication using fuzzy extraction with improved security, and Section 7 presents a security analysis about 16 security properties for the proposed scheme. Section 8 concludes the paper.
2. Related Works
2.1. Attacker's Capability
Throughout this paper, we make the following assumptions about the capabilities of a probabilistic, polynomial-time attacker in order to properly capture the security requirements of the two-factor authentication scheme that uses smart cards in WSNs [15].
has complete control over all message exchanges between the protocol participants, including a user, a sensor, and the gateway. That is, can eavesdrop, insert, modify, intercept, and delete messages exchanged among the three parties at will.
is able to extract sensitive information from the smart card of a user through a power analysis attack or determine the user's password possibly via shoulder-surfing or by employing a malicious card reader. However, it is assumed that is unable to compromise both the information of the smart card and the password of the user. It is otherwise clear that there is no way to prevent from impersonating the user if both factors have been compromised.
2.2. Elliptic Curves Cryptography
Elliptic Curves Cryptography (ECC) is a form of public-key cryptography that is based on the use of algebraic structures of elliptic curves over finite fields. Elliptic curves are also used in several integer factorization algorithms. The important benefit of ECC is that it provides a smaller key size, so ECC can maintain the same degree of security with a smaller key size than other public-key forms of cryptography, such as Rivest Shamir Adleman (RSA), Diffie-Hellman (DH), and Digital Signature Algorithm (DSA). Therefore, ECC is especially useful for wireless devices that are typically limited in terms of their computational ability, power, and network connectivity.
ECC has three related mathematical problems: an Elliptic Curve Discrete Logarithm Problem (ECDLP), Elliptic Curve Computational Diffie-Hellman Problem (ECCDHP), and Elliptic Curve Decisional Diffie-Hellman Problem (ECDDHP). No polynomial time algorithm can solve the ECDLP, ECCDHP, and ECDDHP with nonnegligible probability.
Let be a large prime and choose two field elements satisfying to define the equation of a nonsuper-singular elliptic curve over . Choose a generator point whose order is a large prime number q over . The subgroup G of the elliptic curve group with order q is constructed in the same way. Then, the three mathematical problems in ECC that are defined in several studies [16–18] are given as follows:
ECDLP: given a point element Q in G, find an integer such that , where indicates that point P is added to itself x times through an operation with elliptic curves.
ECCDHP: for , given two point elements , in G, compute in G.
ECDDHP: for , given three point elements , , and in G, decide whether .
In the proposed scheme, we use ECDLP for protecting and . In detail, a user sends to the gateway, and the sensor node sends to the user for authentication and session key agreement. If an attacker knows and , he can attempt various attacks. However, the attacker cannot compute and due to ECDLP even if he steals and from public communication. And in proposed scheme, we use ECCDHP for protecting . In other words, An attacker cannot compute and due to ECCDHP even thought he know and . Only legal user and sensor node can compute and , respectively, using and , and own random number. The user computes and the sensor node computes .
2.3. Fuzzy Extraction
The fuzzy extractor converts biometric information into a uniformly random string. Therefore, it is possible to apply cryptographic techniques for biometric security. The extractor consists of a pair of efficient randomized procedures, (generate) and (reproduce). Li et al.'s scheme uses and are used. The fuzzy extractor generates and by using a user's biometric information during the registration phase. is a uniform and random string, and is the helper string; thus, can be the same under the assistance of auxiliary information even if the the biometric information that has been input changes, so long it maintains a reasonably similar status as the original biometric information. As a result, the fuzzy extraction is error-tolerant, and reproduces the using the biometric information that has been newly input and in the login phase. To reproduce the same , the metric space distances between and have to meet the given verification threshold [19, 20].
The basic notation that is used consistently throughout this paper is shown in “Notations.”
3. Review of Yoon and Kim's Authentication Scheme
Yoon and Kim's authentication scheme includes a registration phase and login and authentication phases. This scheme does not require making changes to a user's password because this scheme only uses biometrics. The gateway node has two master keys and and before starting the system, the gateway issues a long-term secret key to sensor node . x is then used for . During the registration phase, the gateway issues a smart card stored as to [11].
3.1. Registration Phase
In the registration phase, a user communicates securely with the gateway. sends important information regarding the user's identification and biometrics. Figure 1 describes the registration phase, and detailed steps are given as follows. First, chooses and imprints his biometrics on the specific sensor device. Then, computes and sends and to node by using a secure channel. Then, node computes two values: and . And the node inputs into a smart card and sends the smart card to user . is a one-way hash function. is a symmetric parametric function and τ is a predetermined threshold for the biometric verification.
Registration phase of Yoon and Kim's scheme.
3.2. Login and Authentication Phases
During the login and authentication phases, when enters and into a smart card terminal, the smart card must validate the legitimacy of . Then, , , and authenticate each other. This scheme uses three messages during authentication, as shown in Figure 2. Finally, and share the session key after the login and authentication phases; and communicate with each other using the session key .
inserts his smart card into the card reader and imprints his biometric on a specific device to verify the user's biometrics.
The smart card computes two values: and .
The smart card compares the computed and the that is stored in the smart card. If , the user's smart card stops the login phase. Otherwise, the smart card generates a random number .
The smart card computes three values: , , and , where is the current timestamps.
Then, the smart card sends the login message to the node.
Login and authentication phase of Yoon and Kim's scheme.
receives and executes the following actions.
The node checks the freshness of by using . is the expected time interval for the transmission delay. If is not fresh, the node rejects the user's request.
The node computes three values: , , and .
The node checks whether and are equal. If they are not equal, the node stops the session. Otherwise, the node picks up the current timestamps .
The node computes two values: and .
The node then computes and sends it to the sensor node .
receives and performs the following actions.
checks the freshness of using .
computes two values: and .
checks whether and are equal and picks up the current timestamps .
generates and computes . is response to the query of ; .
computes and sends it to the user .
receives and executes the following actions.
checks the freshness of using .
computes and checks whether and are the same.
If the entire authentication phase finishes without any problems, accepts .
and communicate with each other securely using the session key , and and compute .
4. Cryptanalysis of Yoon and Kim's Authentication Scheme
4.1. Biometric Recognition Error
Yoon and Kim's authentication scheme uses a one-way hash function to provide biometric verification. This hash function can be used to map the data of an arbitrary size to data of a fixed size with slight differences in the input data producing very large differences in the output data. Figure 3 describes the biometric recognition error in Yoon and Kim's scheme. Biometrics have general limitations such as false acceptance and false rejection. This means that the output of the imprinted biometrics is not always constant. Although inputs its own biometrics to the scanning device, it is possible to output a different . Therefore, the same biometrics can generate different output, such as the and . A different causes slight differences in and . Therefore, this difference produces a very large difference between and due to the property of hash function. The large difference between and causes a biometric recognition error, so a legal user can fail to accept the smart card verification. As a result, advanced techniques are needed to improve the success rate of a legal user's verification [5].
Biometric recognition error on Yoon and Kim's scheme.
4.2. User Verification Problem
In Yoon and Kim's authentication scheme, verifies a legal user by comparing in and in the output of the decrypted . Specifically, the user computes using a symmetric encryption algorithm; . and do not matter but has a problem in that there is a possibility to obtain unexpected results. This is the reason why is made up by and and consist of , :
Even if biometrics are the same, the output of the scanning device is not constant. Therefore, the same biometrics can generate a different output, like . The different output of the biometrics causes slight differences in and . Due to these slight differences, different and are produced. As a result, the user and en/decrypt the using different keys. cannot get a normal from so the user is not authenticated by even when the user uses its own normal and . This is the reason why the hash function and the symmetric key encryption algorithm have a property that results in large differences due to a slight difference of input. Figure 4 specifically describes the user verification problem in Yoon and Kim's scheme.
User verification problem on Yoon and Kim's scheme.
4.3. Lack of Anonymity
Figure 5 describes how Yoon and Kim's scheme does not provide the anonymity. In this scheme, the user sends its own to over public communication, and sends to the sensor without any protection. Therefore, an attacker can easily acquire from those communications. This results in an information exposure problem. For the ’ incoming communication, an attacker can obtain information of the approximate number of registered users to . Also an attacker can acquire information on which user communicates with . Therefore, the lack of anonymity in Yoon and Kim's scheme raises some problems that need to be addressed by providing user anonymity through a protection technique. To solve this problem, it is necessary to use anonymity identification in the WSNs communication instead of sending a normal [21–23].
Lack of anonymity on Yoon and Kim's scheme.
4.4. Lack of Perfect Forward Secrecy
Perfect forward secrecy means that a session key derived from a set of long-term keys will not be compromised if one of the long-term keys is compromised at some point in the future [24]. Unfortunately, Yoon and Kim's authentication scheme does not provide perfect forward secrecy. Therefore, an attacker can compute the session key between the and if the attacker knows one of the long-term keys in the future. The following list describes how Yoon and Kim's scheme does not provide perfect forward secrecy [5]:
Attacker got , , and in previous public channel.
Attacker knew one of user's long-term secret: .
Attacker has , , , and and computes and as follows:
,
.
Attacker acquires and and then computes .
.
Attacker can compute all of previous session key sk.
In advance, the attacker obtains , , and from previous communication between and . The attacker obtains one of the user's long-term secrets . Then, the attacker can compute and decrypt the using the computed . So the attacker can figure out and random number . Finally, the attacker can compute the session key using , , and .
4.5. Session Key Exposure by the Gateway Node
The session key is used to provide secure communications between and after the authentication phase is successfully finished. Even if the node is a trusted node, it is not necessary for the node to know because usually wants to communicate secretly with without the observation of the node. However, in Yoon and Kim's authentication scheme, the node can compute without difficulty. node can collect previous and in 's authentication phase and thus can obtain all over a public channel. Then, the node can compute all between and . Therefore, the node can decrypt the encrypted message between and , and can figure out all 's secret messages that are protected by session key . The session key exposure by GW on Yoon and Kim's scheme [5] is described as follows:
GW knew and in communication with .
GW got in public channel:
⇒ has , and ,
⇒ .
GW can compute all session key sk between and .
GW can decrypt the secret messages between and .
GW can acquire important information between and .
4.6. Vulnerability to Denial of Service Attack
Figure 6 shows the potential for a DoS attack on Yoon and Kim's authentication scheme. The attacker can send malicious messages that have been generated to consume the battery power of the node and sensor node. The attacker obtains and from the previous public channel communication and generates a current timestamps . When the node and the sensor node receive the malicious messages , they first check for the freshness of the timestamps . However, the generated by the attacker is current, and the node and sensor cannot determine that and are from previous messages. So they execute various functions, such as a hash function, decryption function, and verification function before checking whether the sent by the attacker and the computed are the same. Therefore, the attacker is able to execute a DoS attack without difficulty [5]. The node has sufficient resources that can be used in the system, but the sensors are different. The sensor nodes have a limited computational ability, low battery, low bandwidth, and a small amount of memory. The computational cost of a sensor node is a critical consideration in the design of WSNs since this increases the consumption of the battery power of the sensor [15]. Quite often it is economically preferable to discard a sensor rather than recharge it, and for this reason, the battery power of a sensor is usually important for wireless devices, with its lifetime determining the sensor lifetime. Therefore, it is significant issue for the sensor node to be protected from a DoS attack.
Vulnerability to denial of service attack on Yoon and Kim's scheme.
4.7. Revocation Problem
Yoon and Kim's authentication scheme does use the user's password but only uses the user's and biometrics . Therefore, a password change phase is not necessary. For this reason, when an attacker steals or picks up the user's smart card, a revocation problem occurs. When the node issues the user's smart card, it always produces the same if the sends the same and to the node. So even though reissues a new smart card, cannot discard the lost smart card because the reissued smart card and the lost smart card are the same. Therefore, the user has to change his ID in order to reissue a different smart card. Figure 7 describes the potential problem due to lack of revocation phase on Yoon and Kim's scheme [5].
Revocation problem on Yoon and Kim's scheme.
5. Countermeasures
The vulnerability of Yoon and Kim's scheme to a biometric recognition error and a user verification problem is due to the fact that
though the same inputs its own biometrics to the scanning device, a different output can be generated;
the hash function makes slight differences in the input data by producing very large differences in the output data;
in a symmetric key encryption algorithm , small differences of produce large differences in the output.
This design flaw causes normal users to fail the login phase using smart card. Therefore, we suggest modifying the , , and to prevent a biometric recognition error. Moreover, the difference in and results in a different encryption key . So, this can cause a user verification problem because the differences in and produce a different that is used for authentication between and the node. To prevent an authentication error, we also suggest modifying and . We thus improve Yoon and Kim's scheme using fuzzy extraction as follows.
During the registration phase, instead of , the smart card computes and using a fuzzy extraction function such as . It also computes and sends both and to the node. The node modifies the computation of and from and to
During the login and authentication phase, instead of , , , and , smart card computes the following:
As a result of this modification carried out using a fuzzy extraction function, the accuracy of verification using biometrics improves. Consequently, the biometric recognition error and user verification problem can be solved.
We next present a possible mechanism for eliminating the vulnerability in Yoon and Kim's scheme due to the lack of anonymity. This vulnerability is due to the fact that
is used in public communication without any protection;
the can know how many users are registered in and which user wants to access .
Using the user's , the attacker can acquire a variety of information on the user, , and the sensor. Therefore, we propose to use an anonymity to provide anonymity. Instead of sending a normal , we suggest using in the communication as follows:
sends to a user using = in registration phase. uses only a previous secret x and y so it does not need to add a new secret. The attacker and sensor cannot know and changes every session due to so we can provide user anonymity.
To provide the perfect forward secrecy in our proposed scheme, we modify the computation of from = to
has a secret . Therefore, has two secret and ; moreover, they are independent on each other, and so the session key derived from a set of long-term keys will not be compromised if one of the long-term keys is compromised in the future. is thus important information between and :
Since can be used to eliminate the vulnerability in Yoon and Kim's scheme to session key exposure by the node, this vulnerability is due to the fact that
the node can know all elements of including ;
it is hard to share secret information between and in advance.
To prevent this problem, we suggest a key exchange using elliptic curve encryption. The user generates and computes and :
Then, the user sends to the sensor through the and receives from the sensor, so the sensor can compute as follows:
and can be used by the user and sensor to compute in a manner that is concealed from the node. Therefore, we resolve the session key exposure by the node.
However, even after implementing the modifications described above, Yoon and Kim's scheme is vulnerable to DoS attacks. This type of attack results from the fact that
and the sensor perform all operations without checking the freshness of the incoming messages;
in particular, the sensor has limited energy but this scheme verifies messages after performing various operations.
To prevent the vulnerability to DoS attack, we suggest adding verification to and to check incoming message. We modify the computations for and from and to
In advance, the node and sensor check and to verify an incoming message:
and are thus only computed for a legal user and the node. Due to this modification, the node and sensor can prevent a DoS attack by checking and in and , respectively.
Finally, the revocation problem is prevented by implementing a revocation and reissue phase. This phase should also be modified for consistency, particularly to induce a user to select identification different from previous identifications (see Section 6.3 for details). All the modifications suggested above are combined to propose an improved authentication scheme that is described in the following section.
6. Proposed Scheme
Our proposed scheme is divided into three phases: a user registration phase, login and authentication phase, and revocation and reissue phase. Before our scheme is executed, generates two master keys, x and y, and provides a long-term secret key to the sensor .
6.1. Registration Phase
The registration phase of the proposed scheme is described in Figure 8. The perform a user registration phase with by using a secure channel. computes by using a biometrics scanning device and and using fuzzy extraction. Then, the user's information is sent to the for registration. However, the cannot store the user's biometrics information. The detailed steps are as follows.
selects and scans its own biometrics to compute .
computes and . And then sends to the node.
After receiving , the node computes the authentication parameters for as follows:
stores , , and the authentication parameters; in a smart card. And GW issues the smart card to through a secure channel.
receives the smart card and inputs to the smart card.
Registration phase of the proposed scheme.
6.2. Login and Authentication Phases
The login and authentication phase of the proposed scheme is described in Figure 9. During the login phase, the smart card checks the user's legality by using the user's and biometrics . authenticates the user by checking through the detailed steps of the login phase as follows:
inserts his smart card into a card reader. Then, inputs his and computes the biometric information using a scanning device. The smart card computes , , and using fuzzy extraction and compares with stored in smart card as follows:
The smart card generates a random number and computes , , and . is used for the session key between and . This scheme uses to provide perfect forward secrecy:
picks up the current timestamps and computes , , , and for authentication with . is used to prevent the DoS attack. Then, sends the authentication message to :
Upon receiving from , retrieves the current timestamps and verifies the freshness of the ’ timestamps using . Then, verifies the received using .
computes , , and and decrypts the in . The output of the decryption is used by to authenticate by comparing and :
picks up the current timestamps and , , and to authenticate . Then, sends an authentication message to :
With in hand, retrieves the current timestamps and checks if . If the freshness check for fails, stops the authentication phase. Otherwise, computes and compares it with . After that, computes and decrypts using . Then, checks the sameness between the received and the computed :
To compute , generates a random number and computes , . This is computed only by and due to a mathematical problem inherent to ECC. Then, picks up the current timestamps and computes , for the authentication. After the operation is finished, send to :
First, checks the freshness in and the sameness of . Then, computes using the received , and by using , , and . Only a legal computes using so anyone cannot compute including . Then, accepts RM:
From now on, can communicate securely with using :
Login and authentication phase of the proposed scheme.
6.3. Revocation and Reissue Phase
The revocation problem can result in serious attacks, so a revocation phase should be provided when wants to reissue a smart card due to loss. To prevent the same user identification from being selected, inputs the previous . Then, selects a different identification and sends , to the with hashed biometrics information . After the receives these, revokes and reissues the smart card using . Then, continues into a phase that is equal to the registration phase. Revocation and reissue phase of the proposed scheme is described in Figure 10.
Revocation and reissue phase of the proposed scheme.
7. Security Analysis
This section describes the security analysis to confirm the security of the proposed scheme. We need to provide the following definitions to then compare the proposed scheme to other authentication schemes, including that proposed by Yoon and Kim.
Definition 1.
A strong secret key has a high value of entropy that cannot be guessed in polynomial time.
Definition 2.
A secure one-way hash function is the following. Given x to compute y is easy but y to compute x is hard.
7.1. Biometric Recognition Error
The proposed scheme prevents a biometric recognition error by using fuzzy extraction. Yoon and Kim's scheme uses a hash function to check for conformity in the biometrics. Even if they use a threshold τ, since the hash function makes slight differences in the input data that produces very large differences in the output data, it is possible for biometric recognition errors to occur. However, the proposed scheme using fuzzy extractor prevents biometric recognition errors.
The fuzzy extractor generates and using the user's biometric during the registration phase. is a uniform and random string, and is a helper string, so can be the same with the assistance of auxiliary information even if the user's inputs slightly different biometrics , which thus maintains a reasonably similar status as that of the original biometric information. imprints for registration and computes , , and as follows:
imprints for login and computes , , and and compares with as follows:
With the assistance of , the fuzzy extractor can compute a constant even if the user inputs slightly different biometrics, so the proposed scheme is secure against a biometric recognition error.
7.2. User Verification Problem
The proposed scheme checks for the sameness in the to verify the status a legal user. Concretely, makes using the device and computes and . These values and information stored in smart card are used by to compute and send to . computes from and then computes and . decrypts and confirms . Finally, authenticates as follows if and are the same. imprints for authentication. And then GW computes as follows:
verifies sameness of ID as follows:
Unlike in Yoon and Kim's scheme, can compute constant values including as a result of the fuzzy extractor. Therefore, can authenticate a legal user even if the user inputs a slightly different biometric information . Therefore, the proposed scheme can prevent a user verification problem.
7.3. Anonymity
In the proposed scheme, an attacker cannot compute a user's real identification without because the real identification of the user is always protected using . Therefore, only the legal user and can compute from . stores x and y, so can easily compute . can compute from the stored in the smart card as follows:
To compute , the attacker has to obtain both the user's smart card and . However, even if the attacker can obtain a smart card, he cannot compute . As a result, the attacker cannot obtain the user's real identification . Therefore, the proposed scheme provides user anonymity.
7.4. Perfect Forward Secrecy
Proposed scheme computes the session key between and as follows:
Therefore, to compute all of the session keys of a user, an attacker has to know both and . However, the attacker cannot compute two values using another long-term key because and are independent of each other. In other words, if an attacker knows one of and , he cannot compute the other one, so the session key that is derived from a set of long-term keys will not be compromised, even if one of the long-term keys is compromised in the future. Therefore, the proposed scheme achieves the perfect forward secrecy.
7.5. Session Key Exposure by the Gateway Node
In the proposed scheme, also knows most of the information related to the scheme but cannot compute between and . we suggest as follows:
can know , , , and but cannot acquire and . Even though and , cannot compute and from and because it is mathematical problem about ECC. Therefore, is not exposed by in proposed scheme.
7.6. Vulnerability to Denial of Service Attack
In the proposed scheme, , , and basically check for freshness in the message using timestamps. Therefore, the scheme is considered to be able to endure a DoS attack if an attacker sends a previous message to the server with previous timestamps. Moreover, the DoS attack can be better prevented since the proposed scheme uses , , in , , and , respectively:
, , and include the current timestamps . So, , , and can check for the freshness and legality of , , and because the timestamps of , , and do not match the timestamps of , , and even if the attacker sends the previous , , and with the current timestamps. Therefore, the proposed scheme is more secure against the DoS attack than Yoon and Kim's scheme.
7.7. Revocation Problem
The proposed scheme does not use the user's password but only uses the user's and biometrics for registration. As a result, the proposed scheme needs to provide a revocation and reissue phase when the wants to reissue a smart card due to loss. If a user reissues their own smart card with the same as the previous , the reissued smart card is going to be completely the same as the previous smart card. An attacker could thus make use of the lost smart card due to the sameness. Therefore, the proposed scheme suggests for the to check for differences between the previous and new during the revocation and reissue phase. In other words, we induce a user to select a different identification from the previous identification, so the reissues a new smart card with different information when the user loses his smart card, and the revocation problem is solved in this manner.
7.8. Mutual Authentication
In the proposed scheme, , , and authenticate each other by checking the accuracy of , , and . Specifically, can authenticate whether the that sent is a legal user or not by checking the validity of . Only the legal case computes using and , so can confirm the user's legitimacy by decrypting using . can authenticate by checking if it sends a correct hash by verifying . can be computed within the current time only by a legal and because . Finally, can authenticate and by checking . Only a legal can compute within the current time because only can know and .
7.9. Message Confidentiality
The proposed scheme uses 3 messages , , and in the login and authentication phase as follows:
, , , and RM are basically public information, so they do not need to be protected. Other information can provide confidentiality because an attacker cannot compute important information from , , , , , , , and .
7.10. Password Change Phase
In a password-based authentication scheme, the user should be able to change his own password when he forgets his password or loses his smart card. In detail, to change a password freely, a smart card has to store information related to the user's password, such as . However, when an attacker steals a user's smart card, he can gain all the information stored in the smart card by using a simple and differential power analysis. Therefore, the attacker can obtain a user's password even when it is protected by because a few characters are necessary to use the password. Therefore, a password change phase is important but poses a serious risk in that information (such as the password) for login and authentication can be exposed. However, the proposed scheme uses only a user's biometric information with high entropy; therefore, the attacker cannot obtain the original biometric information, even if is known. Moreover, a user does not forget his biometric information and so does not need to change it.
7.11. Stolen Verifier Attack
If the or stores verifier information, an attacker can attempt a stolen verifier attack. However, the proposed scheme is resistant to a stolen verifier attacker because and do not store a user's identification/password table and the user's biometrics. In the proposed scheme, only stores the secret key x, y, and store only . Therefore, the cannot obtain authentication information from a legal user even if the attacker has the authority to access the database of the and .
7.12. Guessing Attack
Since the proposed scheme does not use the user's password, this scheme is not vulnerable to a guessing attack. Moreover, the user's biometrics is always protected by the one-way hash function. Since the biometrics information has a high level of entropy, unlike a password, the attacker cannot calculate the user's biometric information from the hashed value. When the attacker steals a user's smart card, the attacker can obtain , , , , , from the smart card. However, since , , are hashed values, the attacker cannot obtain any secret information from them. and are not secret information, so the attacker cannot acquire secret information using a guessing attack. Therefore, the proposed scheme is not vulnerable to a guessing attack [25–27].
7.13. Replay Attack
The proposed scheme is secure against a replay attack by adding timestamps , , into authentication messages , , in , , , respectively. Even if the attacker obtains , , and sends them again with the current timestamps, the attacker cannot compute , , using the current timestamps:
7.14. Impersonation Attack
Even if an attacker intercepts the authentication message to impersonate a legitimate user, the attacker cannot normally extract and from , , and since the one-way hash function is implemented according to Definition 2. Without and , the attacker cannot produce a legitimate login and authentication message in the attacker's current time. Therefore, the proposed scheme is secure from impersonation attacks. Likewise, the attacker cannot impersonate a legitimate and . Even if the attacker obtains , the attacker cannot compute or from such due to Definition 2.
7.15. Insider Attack
Typically, malicious insiders want to acquire private user information, such as their biometrics. In the proposed registration phase, a user's smart card device imprints the biometric impression and computes using and then sends to ; . Therefore, cannot obtain using the incoming because of the properties of the one-way hash function. Therefore, the proposed scheme is secure against insider attacks.
7.16. Security Factor
Two- or three-factor authentication methods are implemented by means of a combination of two or three different components. In WSNs, most authentication schemes use a user's password, smart card, and biometric information as components. We propose a two-factor authentication scheme that uses the smart card and biometric information without a password but can provide a similar secure authentication environment comparable to those provided by three-factor authentication schemes.
Table 1 provides a summary and comparison of the security provided by the proposed scheme and that provided by other schemes, including the one by Yoon and Kim.
To provide security to wireless sensors and users, various authentication schemes for WSNs have been proposed recently. The security problem in He et al.'s scheme was addressed by Yoon and Kim, who proposed an advanced biometrics-based user authentication scheme for WSNs. In this paper, we have identified vulnerabilities in Yoon and Kim's scheme in terms of a biometric recognition error, a user verification problem, lack of anonymity and perfect forward secrecy, session key exposure by the GW node, vulnerability to a DoS attack, and a revocation problem. To solve these security vulnerabilities, we have suggested specific countermeasures, including the use of fuzzy extraction to imprint biometrics during the registration phase consisting of error-tolerant cryptographic primitives for biometric security. We recommend the use of the sensor node's random number and ECC to exchange a random number between a user and the sensor node during the authentication phase. ECC can maintain the same degree of security with a smaller key size than other forms of public-key cryptography. Therefore, ECC is suitable for use with wireless devices that have limited resources. In accordance with these countermeasures, we propose a biometrics-based authentication scheme based on fuzzy extraction with improved security. In addition, we conduct a security analysis to show that the proposed scheme is more secure than other authentication schemes.
Footnotes
Notations
Conflict of Interests
The authors declare no conflict of interests.
Authors' Contribution
Younsung Choi, Youngsook Lee, and Dongho Won contributed to the security analysis, design of the proposed scheme, and preparation of the paper.
Acknowledgment
This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2015-H8501-15-1003) supervised by the IITP (Institute for Information and communications Technology Promotion).
References
1.
NamJ.KimM.PaikJ.LeeY.WonD.A provably-secure ECC-based authentication scheme for wireless sensor networksSensors (Switzerland)20141411210232104410.3390/s1411210232-s2.0-84908621929
2.
WongK. H. M.YuanZ.JiannongC.ShengweiW.A dynamic user authentication scheme for wireless sensor networks1Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy ComputingJune 2006Taichung, Taiwan24425110.1109/sutc.2006.16361822-s2.0-33845458336
3.
KimJ.LeeD.JeonW.LeeY.WonD.Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networksSensors20141446443646210.3390/s1404064432-s2.0-84898648439
4.
WatroR.KongD.CutiS.-F.GardinerC.LynnC.KruusP.TinyPK: securing sensor networks with public key technologyProceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ‘04)October 2004Washington, DC, USAACM5964
5.
ChoiY.NamJ.LeeY.JungS.WonD.Cryptanalysis of advanced biometric-based user authentication scheme for wireless sensor networksComputer Science and Its Applications2015330Berlin, GermanySpringer13671375Lecture Notes in Electrical Engineering10.1007/978-3-662-45402-2_190
6.
DasM. L.Two-factor user authentication in wireless sensor networksIEEE Transactions on Wireless Communications2009831086109010.1109/TWC.2008.0801282-s2.0-62949130774
7.
TsengH.-R.JanR.-H.YangW.An improved dynamic user authentication scheme for wireless sensor networks1Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM ‘07)November 2007Washington, DC, USA98699010.1109/glocom.2007.1902-s2.0-39349093196
8.
HeD.GaoY.ChanS.ChenC.BuJ.An enhanced two-factor user authentication scheme in wireless sensor networksAd-Hoc and Sensor Wireless Networks20101043613712-s2.0-78650459565
9.
KhanM. K.AlghathbarK.Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks'Sensors20101032450245910.3390/s1003024502-s2.0-77955495427
10.
ChenT.-H.ShihW.-K.A robust mutual authentication protocol for wireless sensor networksETRI Journal201032570471210.4218/etrij.10.1510.01342-s2.0-78049334450
11.
YuanJ.JiangC.JiangZ.A biometric-based user authentication for wireless sensor networksWuhan University Journal of Natural Sciences201015327227610.1007/s11859-010-0318-22-s2.0-77952339469
12.
YoonE.-J.YooK.-Y.Cryptanalysis of robust mutual authentication protocol for wireless sensor networksProceedings of the 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC ‘11)August 2011Alberta, CanadaIEEE39239610.1109/coginf.2011.60161712-s2.0-80053293841
13.
HeD.Robust biometric-based user authentication scheme for wireless sensor networksIACR Cryptology ePrint Archive20122012, article 203
14.
YoonE.-J.KimC.Advanced biometric-based user authentication scheme for wireless sensor networksSensor Letters20131191836184310.1166/sl.2013.30142-s2.0-84893438606
15.
ChoiY.LeeD.KimJ.JungJ.NamJ.WonD.Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptographySensors2014146100811010610.3390/s1406100812-s2.0-84902296026
16.
KarJ.MajhiB.An efficient password security of multiparty key exchange protocol based on ECDLPInternational Journal of Computer Science and Security200935405413
17.
LuR.CaoZ.ChaiZ.LiangX.A simple user authentication scheme for grid computingInternational Journal of Network Security2008722022062-s2.0-70349791260
18.
GirukaV. C.ChakrabartiS.SinghalM.A distributed multiparty key agreement protocol for dynamic collaborative groups using ECCJournal of Parallel and Distributed Computing200666795997010.1016/j.jpdc.2006.03.0062-s2.0-33744525893
19.
DodisY.ReyzinL.SmithA.Fuzzy extractors: how to generate strong keys from biometrics and other noisy dataAdvances in Cryptology—EUROCRYPT 20042004Berlin, GermanySpringer52354010.1007/978-3-540-24676-3_31MR2153192
20.
BoyenX.Reusable cryptographic fuzzy extractorsProceedings of the 11th ACM Conference on Computer and Communications Security (CCS ‘04)October 2004Washington, DC, USA82912-s2.0-14844335721
21.
JeonW.KimJ.NamJ.LeeY.WonD.An enhanced secure authentication scheme with anonymity for wireless environmentsIEICE Transactions on Communications2012E95-B72505250810.1587/transcom.E95.B.25052-s2.0-84863463143
22.
NamJ.ChooK. R.ParkM.PaikJ.WonD.On the security of a simple three-party key exchange protocol without server's public keysThe Scientific World Journal20142014747953410.1155/2014/479534
23.
ChooK. R.NamJ.WonD.A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsInformation Sciences201428118220010.1016/j.ins.2014.05.041MR32309282-s2.0-84904595350
24.
ChoiY.NamJ.LeeD.KimJ.JungJ.WonD.Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometricsThe Scientific World Journal201420141528130510.1155/2014/281305
25.
KocherP.JaffeJ.JunB.Differential power analysisAdvances in Cryptology—CRYPTO'9919991666Berlin, GermanySpringer388397Lecture Notes in Computer Science10.1007/3-540-48405-1_25
26.
MessergesT. S.DabbishE. A.SloanR. H.Examining smart-card security under the threat of power analysis attacksIEEE Transactions on Computers200251554155210.1109/tc.2002.1004593MR19010042-s2.0-0036566408
27.
MuthukuruJ.SathyanarayanaB.A survey of elliptic curve cryptography implementation approaches for efficient smart card processingGlobal Journal of Computer Science and Technology2012121