TY - JOUR
T1 - A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks
AU - Xiong, Ling
AU - Peng, Daiyuan
AU - Peng, Tu
AU - Liang, Hongbin
AU - Liu, Zhicai
N1 - Publisher Copyright:
© 2017 by the authors. Licensee MDPI, Basel, Switzerland.
PY - 2017/11/21
Y1 - 2017/11/21
N2 - Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.
AB - Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.
KW - Mutual authentication
KW - Strand space model
KW - User anonymity
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=85035022238&partnerID=8YFLogxK
U2 - 10.3390/s17112681
DO - 10.3390/s17112681
M3 - Article
C2 - 29160861
AN - SCOPUS:85035022238
SN - 1424-8220
VL - 17
JO - Sensors
JF - Sensors
IS - 11
M1 - 2681
ER -