In a recent paper, Chang and Le proposed an efficient smart card–based authenticated key exchange protocol (which is referred to as CL scheme) for heterogeneous ad hoc wireless sensor networks. However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. An improved protocol is proposed to fix this problem.
Wireless sensor networks (WSNs) play more and more important role in many critical practical applications, such as battle field monitoring, healthy data acquisition, and many others. In WSN-based applications, data collected and stored by sensors are usually valuable and sensitive, which should be protected against unauthorized access from malicious attackers. An ideal solution for providing both secrecy and authentication is to apply the well-known cryptographic primitive—authenticated key exchange (AKE). The “form” of an AKE protocol here is closely related to the system model of the deployed WSNs.
System model
We here consider a system model (shown in Figure 1) for heterogeneous ad hoc WSNs which involve three types of principles, that is, users (U), sensors (S), and a gateway node (GWN). In this system, a user may hold a smart card, who wants to access or configure a sensor (on-site) in terms of actual field conditions. The user’s smart card is used as a security tool to authenticate the user via both memorable password and its stored long-term symmetric authentication key. Meanwhile, an AKE protocol is typically executed among user’s smart card, sensor, and GWN to establish a secure channel between user and sensor. Since the smart card and sensor do not share an authentication key, the online authentication is carried out by the remote GWN which shares symmetric authentication keys with users and sensors, respectively.
System model.
Related work
A sensor node is typically limited in power, storage, and computation resources. This has led to the development of so-called “lightweight” multi-factor user authentication schemes and AKE protocols for WSNs.1–15 However, these AKE schemes have various protocol structures determined by underlying wireless sensor networks. For example, the protocols proposed in previous studies10,12–17 are specifically designed for Internet of things (IoT), wherein the GWN stands in the middle of the user and the sensor to take charge of the communication between them. We refer the reader to the work by Ferrag et al.18 for more recently proposed lightweight AKE schemes. In this article, we primarily concern about the AKE schemes1,2,6,7,9–11 under the system model shown in Figure 1. Note that building a secure AKE protocol for WSNs is non-trivial, since more than two participants and multiple authentication factors might be involved. Any subtle errors may lead to a broken protocol. Specifically, several previous schemes are found1,5,7,9,11 to be vulnerable to certain practical active attacks.
Chang and Le9 recently showed that a previous protocol proposed by Turkanovic et al.7 is vulnerable to stolen smart card attack, impersonation attack with node capture, sensor node spoofing attack, stolen verifier attack, and backward secrecy attack. As an improvement of Turkanovic et al.’s scheme, two lightweight AKE protocols (i.e. called P1 and P2) were introduced by Chang and Le9 (which will be referred to as CL scheme), which can provide both authentication and data privacy for the communication between user and sensor. The CL scheme can be considered as a trade-off between security and performance; that is, the CL scheme aims to satisfy the most desirable security attributes but provides high performance with low computation and communication cost (which are important for WSNs). In particular, only one authentication key is required to be stored at GWN. This dramatically improves the storage performance of GWN. Besides the efficiency, one of the advantages of the CL scheme is its provable security. The security of the CL scheme was proven in a model (which will be referred to as CL model) that is derived from the AKE model by Bellare et al.19 A protocol with security proof is reasonably necessary to formally show that its targeting security goals and properties (specified by the corresponding security model) are satisfied.
However, a security proof itself needs time to be further validated and discussed by researchers to avoid errors that were somehow overlooked. In 2016, Das et al.11 instigated the weaknesses of CL protocols, that is, the CL protocols cannot resist with smart card lost/stolen attacks and session-specific temporary information attacks. The password update phase of the CL protocols was also criticized by Das et al. by lacking of local password verification during the authentication phase. In order to enhance the security of the CL protocols, an efficient three-factor AKE for WSNs is presented to eliminate the weaknesses of the CL protocols.
Our results
In this work, we further revisit the security results of the CL scheme. We first notice that some key elements (e.g. the freshness and security experiment) in the CL security model are not well-formulated at all. This may lead to an awkward situation that no protocols can be proven secure in the CL model. We hereby clarify the ambiguities and fix up the loopholes in the CL model by showing a revised version. Furthermore, we notice that some recently proposed multi-factor AKE protocols11,14 are claimed to satisfy probably security. But similar problems can be also found in the models defined in these literature. Hence, our improved model can serve as a guidance to show how to formulate security definitions for three-party multi-factor AKE protocols. Researchers can simply derive new appropriate security models from ours to formally re-analyze the state-of-the-art “provable secure” AKE protocols11,14 for WSNs.
In particular, we figure out that the CL scheme cannot provide session key security as claimed by the authors since it is unable to resist with sensor capture attack, namely, the security result of Chang and Le9 Theorem 2 is incorrect. We show that the attackers can make use of a corrupted sensor to impersonate arbitrary uncorrupted users to uncompromised sensors as it wishes. We notice that such corruption of a sensor is allowed in the security analysis of P2.9 It is not hard to see that such attack is very harmful in real-world applications. For example, if an attacker plants a malicious sensor, then it can intercept all communications among uncorrupted principles. In order to fix this problem, we give a simple and effective improvement with minimum modifications to P2. The improved scheme is also shown as an example to achieve the provable security with random oracles in our revised security model.
Organizations
The remainder of the article is organized as follows. Section “Security model” discusses the problems of the CL model and introduces our revised security model. Subsequently, in section “On the security of the CL protocol,” we introduce an attack against the CL scheme and our improvement. Section “Performance comparison” shows our experimental and comparison results. Finally, section “Conclusion” concludes this article.
Security model
The CL model9 is defined very vaguely and informally. Based on the CL model, it cannot be used to analyze the security and the corresponding proof of the CL protocol. In the sequel, we first give some remarks on relevant important notions which are defined inappropriately in the CL model. Second, we re-define the security definitions to obtain an improved security model. The notations used in the rest of the article are first recalled in Table 1.
Notations.
User
Gateway node
Sensor node
Identity of a party
Identity of a sensor
Identity of GWN
General identity which might denote an
Identity in
Password of
Smart card of
Long-term secret of GWN
Timestamp
Expected transmission delay
Random numbers
Point on an elliptic curve
x-axis value of the point P
Concatenation, XOR, and hash operation
Remarks on the CL security model
We hereby mainly discuss the problems of the CL model from the following two perspectives: (1) freshness and (2) security experiment. Note that all these elements are fundamental to a security model, which are unfortunately not well addressed by the CL model. We review the freshness defined in the CL model:
Freshness
The instance or is fresh if their session key has not been revealed to the adversary .9
The problems of such freshness definition are summarized as follows:
In the CL model, there is no query (as in the work by Bellare et al.19) which allows the adversary to obtain the session key of a session. Hence, there is no way for an adversary to reveal the session key in the CL security experiment.
and queries are defined without any restrictions on this freshness definition. This implies that an adversary can trivially ask a query to obtain the long-term secret key of , even for the target session. Then is able to run some protocol instance with on behalf of and select as the test session in the security experiment. In this situation, can always win using her own ephemeral secret key and the long-term secret key of .
According to the above discussions, we, first, have the conclusion that no protocol can be secure in the CL model.
Second, the security experiment is not clearly defined. There is no formulation on the timing of oracle queries which are performed in the security experiment. For example, whether an adversary can keep asking oracle queries after the Test query. This would also affect the security definition. Note that the adversary is allowed to ask many queries in the CL model. However, the guess bit returned by an adversary is not associated with a specific Test query so that we cannot correctly evaluate the advantage of an adversary.
Improved security model
We here define a security model which is suitable for proving the CL protocol. This model follows from indistinguishability-based AKE security models.19–22 In the following, let be positive integers. In the execution environment, we fix a set of honest users and sensors at all. We may use a general in the following to denote one of these kinds of identity in .
We assume that each honest party can only sequentially execute the protocol. This restriction is used to prevent replay attacks. This is characterized by a collection of oracles for users, oracles for sensors, and oracles for GWN. Each oracle behaves as party carrying out a process to execute the protocol instance with some partner (which is determined during the protocol execution). All oracles of have access to the authentication credential–related information stored on the devices (e.g. the smart card of a user and GWN). For time and pre-specified time interval , only one protocol instance can be executed within time period .
Moreover, we assume each oracle maintains a list of independent internal state variables including (1) —execution state , (2) —identity of the intended communication partner, (3) —timestamp at when the oracle is executed, (4) —session key, and (5) —the protocol messages orderly sent and received by . Furthermore, we will always assume (for simplicity) that if an oracle has not reached accept state (yet).
Adversarial model
An active adversary in this model is formalized as a probabilistic polynomial time (PPT) Turing Machine. The active attack powers of an adversary are formulated by allowing it to ask the following queries:
: If , , and have not yet been used, this oracle executes the protocol between these instances and gives the transcript of this execution to the adversary. This oracle query models passive eavesdropping of a protocol execution.
: The adversary can use this query to send any message of his own choice to the oracle . The oracle will respond with the next message (if any) to be sent according to the protocol specification and its internal states. Oracle would be initiated via sending the oracle the first message consisting of a special initialization symbol and the identity of the intended partner. After answering a query, the oracle variables will be updated depending on the specific protocol.
: Oracle responds with the contents of the variable if and only if the oracle has reached an internal state and .
: This query returns information stored on the smart card of the user .
: This query returns information stored on the sensor .
: If oracle has state or or , then the oracle returns some failure symbol ⊥. Otherwise, it flips a random bit , samples a random key , and sets , where is a session key space. Finally, the key is returned. The oracle selected by adversary in this query is called as test oracle.
Secure AKE protocols
During the protocol execution, two oracles may interact with each other to exchange messages for key establishment. We here define a notion concerning partnership following Bellare and Rogaway22 which is specifically introduced for three-party AKE. Note that the patterning notion in Chang and Le9 is defined in a similar way (but quite informal).
Let be a partner function22 which is a map on given execution states of points to its partner oracle , where and . The output of partner function should be uniquely determined by of each oracle. In terms of the CL protocol, we realize by returning if and only if all of the following conditions are held:
Both and accept.
and ;
;
or .
is the unique oracle (which meets the above conditions).
Correctness
We say an AKE protocol is correct if two accepted oracles and are partner, then both oracles hold the same session key.
In order to define the security, we define two notions on oracle freshness that describe the active attacks allowed in the following security experiment. Let be an accepted oracle with intended partner , where . And let be an oracle (if it exists), such that is a partner oracle of , that is, .
Definition 1
Oracle Freshness with Forward Secrecy (OFFS)—the oracle is said to be if none of the following conditions holds:
queried ;
If exists, queried ;
If is user, queried either or prior to the acceptance of ;
If is sensor, queried either or prior to the acceptance of .
Definition 2
Oracle Freshness without Forward Secrecy (OFwoFS)—the oracle is said to be OFwoFS-fresh if none of the following conditions holds:
queried ;
If exists, queried ;
If is user, queried either or ;
If is sensor, queried either or .
We let .
Security experiment
On input security parameter , the security experiment is proceeded as a game between a challenger and an adversary based on AKE protocol , where the following steps are performed:
At the beginning of the game, the challenger implements the collection of oracles for users and for sensors, and for GWN. All long-term pre-shared key for users, sensors, and GWN are generated, respectively. gives the adversary all identities as input.
may issue a polynomial number of queries regarding , , , , and .
At some point, may issue queries during the experiment. After the query, can keep asking other queries as it wishes.
At the end of the game, may terminate and output a bit as its guess for of query. Then the experiment would return a failure symbol ⊥ if one of the following conditions is held: (1) has not issued any query, or (2) the query returns a failure symbol ⊥, or (3) the test oracle is not .
Finally, the experiment returns if ; Otherwise, is returned.
Formally, an instance represents an online attack if both following conditions hold at the time of the Test query: (1) at some point, the adversary queried and is not corrupted and (2) at some point, the adversary queried or . The number of online attacks represents a bound on the number of passwords the adversary could have tested in an online fashion. Let be the maximum bit length of a user’s password. The maximum number of online attacks that can perform to the owner of the test oracle is bound by .
Definition 3
Session Key Security—Given a correct AKE protocol and an adversary which runs the above security experiment without failure, we then define the advantage of as follows
We say that a correct AKE protocol is session-key-secure if for all adversaries the advantage such that where is a negligible function in the security parameter .
On the security of the CL protocol
A sensor capture attack against the CL protocol
CL Protocol
We first briefly review the P2 protocol.9 The user registration phase is shown in Figure 2. The protocol execution of P2 is depicted in Figure 3.
We here describe a sensor capture attack against the session key security of P2.9 The protocol P1 has the same problem.9 In this attack, we will make use of some compromised sensor to impersonate an arbitrary honest user. Note that the corruption of sensor is allowed in Theorem 2.9 In real-world applications, such compromised sensor might be also registered by an attacker as well. The core attack idea is to extract the secret which is used to compute the authentication message . However, is only computed involving an honest user ’s secret and timestamp . This implies that the can be re-used many times in different sessions (to impersonate to any uncompromised sensors) during .
The concrete attack steps performed by an adversary are described as follows:
corrupts some sensor say to obtain its long-term secret , that is, via . The goal of , for instance, is to impersonate some honest user to communicate with another uncompromised sensor .
asks to run a protocol instance with sensor , that is, via sending the first message as . intercepts the message .
gets timestamp and honestly computes which is computable via compromised .
sends to GWN and receives .
computes . At this point, we stress that the is able to impersonate to at time . We next show that the attack is possible if the time consumption of the above execution is less than . This is very like to happen, for example, .
selects a random and and computes and . The message is sent to some oracle of sensor , say .
Meanwhile would run the protocol with GWN honestly. replies with message where and is chosen by .
Finally, could compute and session key , where is the x-coordinate of the point . Note that is chosen by of its own choice.
Note that based on such corrupted sensor, is able to launch (unlimited) the above attack to impersonate any honest users to any uncompromised sensors at an arbitrary time chosen by . This would enable us to break the session key security of P2. It is not hard to see that this attack is also very harmful in practice. We highlight that the similar attack can be also mounted to P1.
Since the attack mainly exploits the corrupted sensor to obtain the secret which can be extracted from the ciphertext based on the corrupted secret key . Therefore, the attack time roughly equals to the message delivery time of and and computation time of two hash operations (for computing and ). If the attacker fails within a time , it can just choose another time to start the attack again.
An improved protocol
In order to fix the problem of P2 (cf. P1), the computation of should be modified. Specifically, we suggest adding the sensor’s identity into the generation of , that is, . We also include the messages exchanged between user and sensor into the session key generation so that the resultant session key is uniquely bound to a specific session. The rest of protocol execution of P2 remains the same. The improved protocol is shown in Figure 4 with minimum modifications. The improved protocol preserves all the properties of the original protocol such as session key security and perfect forward secrecy (PFS).
The improved P2.
The improved protocol consists of four phases which are described as follows:
User registration phase. The user registration phase is shown in Figure 2.
The user selects an identity and a password and generates a random nonce . computes and sends the registration message to the GWN over some secure channel.
Upon receiving , GWN verifies the user’s identity and generates a random nonce . Then, GWN computes a pseudonym for and uses its long-term key to compute and . Finally, creates a smart card and issues it to the user over some secure channel.
After receiving the smart card , writes the value into it. Eventually, the smart card stores .
Sensor registration phase. The sensor registration phase should be also run over some secure channel. As for a sensor node , GWN first selects a unique identity . Then, GWN computes . Meanwhile, the tuple is stored by GWN. Finally, the identity and the authentication key are written into the sensor node .
Authentication and key exchange phase. The following protocol steps are performed:
Message 1 (m1): to
inputs its identity and password .
Upon receiving , the smart card computes and the corresponding authentication key .
gets the current timestamp and selects a random value . Next, computes an ephemeral public key , a ciphertext and an authentication message .
The message is sent to the sensor .
Message 2 (m2): to GWN
Upon receiving , checks whether or not is a valid timestamp.
gets a timestamp and computes an authentication message .
The message is sent to GWN.
Message 3 (m3): GWN to
Upon receiving , GWN aborts if either or is not valid.
GWN computes verification messages and , , and . GWN rejects if and .
Next, GWN gets a timestamp and computes an authentication key and a ciphertext , and authentication messages and .
The message is sent to the sensor .
Message 4 (m4): to
Upon receiving , checks , and computes the verification key . rejects if .
selects a random value and computes an ephemeral public key . Next, gets a timestamp and computes a ciphertext .
The session key is computed as , where is the x-coordinate of the point . The input of the hash function covers almost all protocol messages exchanged between user and sensor, so that the session key is uniquely bound to a session identified by such transcript.
The message is sent to the user .
Finalize: User .
Upon receiving message , checks the timestamp and computes the verification message and rejects if .
computes the session key .
User authentication key change phase. Suppose the user has been authenticated in an AKE session with his or her old password , has in that session. Then the user inputs his new password . After this, computes and . Finally, stores .
The decisional Diffie–Hellman assumption
Let be a group of prime order under an elliptic curve. Let be a random generator of . The decisional Diffie–Hellman (DDH) problem is stated as follows: given tuple for as input, it is hard to distinguish whether .
Definition 4
For a group of prime order and an adversary , we define the following experiment:
; ; ;
if then , otherwise ;
; if then return 1, otherwise return 0.
The advantage of in above experiment is defined as follows
We say that the problem relative to a group of prime order holds, if for all PPT adversaries the advantage is a negligible function in .
Theorem 1
Suppose that the hash function is modeled as random oracle, the output bit length of the hash function is , and the problem relative to a group with prime order holds, then the fixed protocol is session-key-secure such that , where is the number of allowed random oracle query.
Due to this modification, each credential is particularly bound to an execution between the user and the sensor at time . Thus, the attacker is unable to abuse involving some malicious sensor to impersonate to some honest sensor .
Proof
The proof is proceeded following the game-based approach.23 Let denote the advantage of in Game .
Game 0
The first game is the real security experiment which is run between an adversary and an AKE challenger . Thus, we have that
Meanwhile, will simulate the queries of as follows:
and queries will be honestly simulated as defined in section “Security model” following our protocol specification.
: The session key returned by this query is .
: This query returns of .
: This query returns the contents of of .
: This query will be honestly simulated as defined in section “Security model.” However, the test oracle (asked by this query) should keep fresh throughout the security experiment in the sense of Definition 1.
In this game, the challenger just simulates these queries following the protocol specification without any modification. In the subsequent games, we may change them step by step till the advantage of the adversary is zero.
Game 1
In this game, the challenger aborts if the adversary asks the random oracle with a user password and its randomness as input, that is, . This implies that the adversary can ask a query, such that . Recall that is used to compute which is used to decrypt . In this case, the adversary must be able to succeed in online attacks.
The length of the password is assumed to be . Hence, if the adversary can input the correct , then it is able to impersonate the user (e.g. after obtaining the victim’s smart card without compromising the secret information stored in the smart card). The probability that correctly guesses is about . Note that can try times which is the maximum number of query to all parties. The winning probability of a successful online attack is bound to . Thus, we have that
Game 2
In this game, the challenger first aborts if a fresh oracle of receives a valid which is not sent by any fresh oracle of at a valid time. To generate a valid , the adversary has to either (1) break the one-wayness of the hash function or (2) randomly guess (correctly) the output of the random oracle for generating . If the case (1) holds, the adversary may be able to ask the random oracle and with the correct but without asking the corresponding query. The abort event implies that the adversary is able to either find the pre-image of the hash value (after obtaining the protocol transcript via query) or forge the protocol message. Since each is used only once, either or is protected by the one-wayness of the hash function . Hence, the probability of correctly generating a valid for is bound to . Furthermore, we add another similar abort rule that the challenger aborts if an oracle of receives a valid which is not sent by any fresh oracle of . The security of is quite similar to that of .
Since there are two such authentication messages, and , each of which has two related hash operations, can ask at most random oracle queries. We therefore have that
Game 3
In this game, the challenger aborts if one of the following conditions holds: (1) a fresh oracle of receives a valid which is not sent by any fresh oracle of or (2) a fresh oracle of receives a valid which is not sent by any fresh oracle of . With the similar arguments in the previous game, we have that
As a result in this game, we have the fact that the test oracle must have a partner oracle; otherwise, the challenger has aborted.
Game 4
In this game, we try to reduce the security to the DDH hard problem. We change the session key of the test oracle to be a random value. If there exists an adversary which can distinguish this game from the previous game, then we can make use of it build an algorithm to solve the DDH problem. Given a DDH challenge instance , the job of is to distinguish . Meanwhile, first guesses the test oracle and its partner oracle. If its guess is incorrect then it aborts. The abort probability is bound to . In the following, we assume that ’s guess is correct. Then sets the ephemeral DH key of the test oracle to and its partner oracle’s DH key as . The session key of the test oracle is computed as . The other simulations are similar to the previous games. So that if , then the game is identical to the previous game. Otherwise, it is equivalent to this game. Due to the hardness of the DDH problem, we have that
As the bit in the Test query is not used anymore, the advantage of an adversary in this game is zero, that is, . To sum up all probabilities in the above games, we get the result of this theorem.
Performance comparison
In this section, we compare our improved scheme with related existing similar lightweight AKE protocols of Shi and Gong4 (SG), Choi et al.6 (CLK+), Turkanovic et al.7 (TBH), and Das et al.11 (DKO+) which are run under the same system model.
We approximately test the performance of compared protocols on PC with Intel Core i7, 4.2 GHz+8GB RAM, and Python 2.7. Let and denote the estimated experimental time of 224-bits elliptic curve point multiplication and a SHA256 hash function operation (for 128 bytes message), respectively. We omit the cost of in the comparison, which is much smaller than the other two types of operations. We specifically have that and . We consider a biometric computation required by Das et al.’s scheme as a hash operation. The comparison of computational cost is listed in Table 2.
In Figure 5, we compare the communication cost of our scheme with existing schemes. We make reasonable assumptions that each identity is 128 bits, each random nonce is 256 bits, each timestamp is 64 bits, each elliptic curve cryptography (ECC) group value is 224 bits, and each hash value is 256 bits.
Communication cost.
Turkanovic et al.’s7 scheme (TBH) is more efficient than all other listed protocols but it does not provide PFS. Our improved scheme inherits the high performance of P2,9 which provides a trade-off between security and performance. Although the computation cost of our scheme is slightly more expensive than that of Shi et al.’s scheme (SG), our scheme is the most efficient one for the user and GWN among those compared protocols which satisfy PFS. Furthermore, our scheme has the best communication performance.
Conclusion
In this article, we revisited a recently proposed AKE scheme9 for WSNs. We have shown that there is a security vulnerability in this scheme. We also demonstrated a concrete attack and gave a solution for avoiding this attack. Some improvements for the security model have been given for analyzing the improved protocol. Since a good AKE protocol might need to provide as many security properties as possible, it might be interesting (as a future work) to further improve our protocol and Das et al.’s11 scheme by incorporating more security attributes as introduced in recent literature.12,24 Of course, one could also strengthen our security model to cover more active attacks for specific protocols.
Among those security properties, PFS has been a de facto standard property of AKE. Recently proposed lightweight AKE protocols,4,6,9,12,25 all achieve PFS based on Diffie–Hellman key exchange (DHKE). Since two exponential operations are required in DHKE, it is not efficient for either smart card or sensor due to its low processing resources. Another open problem is to construct lightweight AKE protocols which provide PFS without relying on Diffie–Hellman–like primitives.
Footnotes
Handling Editor: Al-Sakib Khan Pathan
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This study was supported by the Research Project of the Humanities and Social Sciences of the Ministry of Education of China (grant nos 16YJC870018 and 15YJC790061), National Natural Science Foundation of China (grant nos 11647097, 61502064, and 61503052), Open project of Key laboratory of higher education of Sichuan province for enterprise informatization and IoT (grant no. 2015WZJ02), Research Foundation of the Natural Foundation of Chongqing City (grant nos cstc2013jcyjA0076, cstc2016jcyjA40019, and cstc2017jcyjAX0277), China Post-doctoral Science Foundation (grant no. 2017M612911), and Scientific and Technological Research Program of Chongqing Municipal Education Commission (grant nos KJ1600932 and KJ1600928).
ORCID iD
Zheng Yang:
References
1.
HeDGaoYChanSet al. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Ne2010; 10(4): 361–371.
2.
DasAKSharmaPChatterjeeSet al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl2012; 35(5): 1646–1656.
3.
XueKMaCHongPet al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl2013; 36(1): 316–323.
4.
ShiWGongP. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens N2013; 2013: 730831.
5.
TurkanovicMHolblM. An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektron Elektrotech2013; 19(6): 109–116.
6.
ChoiYLeeDKimJet al. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors2014; 14(6): 10081–10106.
7.
TurkanovicMBrumenBHlblM. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw2014; 20(2): 96–112.
8.
ChangCCHsuehWYChengTF. A dynamic user authentication and key agreement scheme for heterogeneous wireless sensor networks. Wireless Pers Commun2016; 89(2): 447–465.
9.
ChangCCLeHD. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE T Wirel Commun2016; 15(1): 357–366.
10.
JungJKimJChoiYet al. An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sensors2016; 16(8): E1299.
11.
DasAKKumariSOdeluVet al. Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur Commun Netw2016; 9: 3670–3687.
JiangQZeadallySMaJet al. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access2017; 5: 3376–3392.
14.
ParkKParkYParket al. Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access2017; 5: 25110–25125.
15.
AliRPalAKKumariSet al. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener Comp Sy. Epub ahead of print 15July2017. DOI: 10.1016/j.future.2017.06.018.
16.
ShimK-A. BASIS: a practical multi-user broadcast authentication scheme in wireless sensor networks. IEEE T Inf Foren Sec2017; 12(7): 1545–1554.
17.
WazidMDasAKKumarNet al. Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access2017; 5: 14966–14980.
18.
FerragMAMaglarasLAJanickeHet al. Authentication protocols for Internet of Things: a comprehensive survey. Secur Commun Netw2017; 2017: 6562953.
19.
BellareMPointchevalDRogawayP. Authenticated key exchange secure against dictionary attacks. In: Advances in cryptology—EUROCRYPT, Bruges, 14–18 May 2000, pp.139–155. Heidelberg: Springer.
20.
JagerTKohlarFSchägeSet al. On the security of TLS-DHE in the standard model. In: Advances in cryptology—CRYPTO, Santa Barbara, CA, 19–23 August 2012, pp.273–293. Heidelberg: Springer.
21.
YangZYangWZhuLet al. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation. Secur Commun Netw2015; 8(18): 3356–3371.
22.
BellareMRogawayP. Provably secure session key distribution: the three party case. In: 27th annual ACM symposium on theory of computing, Las Vegas, NV, 29 May–1 June 1995, pp.57–66. New York: ACM Press.
23.
ShoupV. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332, 2004, http://eprint.iacr.org/
24.
YaqoobIAhmedEur RehmanMHet al. The rise of ransomware and emerging security challenges in the Internet of Things. Computer Networks2017; 129: 444–458.
25.
ChenYMartínezJFCastillejoPet al. A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth. Wirel Commun Mob Com2017; 2017: 5290579.