function SHA-512 is used to generate the message
digest in our scheme. However, 160 bit SHA-1 hash
function can also be used to reduce the memory
requirement for gateway (GW) and sensor modules.
Figure 3: SystemC architecture of our protocol.
The authentication latency of our scheme is a
function of the number of users, encryption cipher
and channel transmission rate among the modules.
We executed the simulation 20 times and observed
that the average authentication latency of our
scheme is 0.29 seconds (for one user). The effect of
simultaneous multiple users’ login requests on
authentication latency is also being investigated.
Replay, node capture, gateway bypass and multiple
login attacks are further investigated by simulating
our authentication protocol. It is verified that the
protocol is resistant against all the above attacks that
re-affirms our claims of Section 3. The main focus
of our scheme is to provide application layer
security. However, the security can further be
enhanced by incorporating IEEE 802.15.4 (2003)
specification at MAC sub-layer for all the phases of
the proposed authentication protocol.
Finally, a memory requirement comparison is
made between the Vaidya et al.’s scheme (2009) and
our protocol. The user data storage requirements for
both schemes are presented in Table 3. The storage
requirement for sensor node in our scheme is
slightly higher than Vaidya et al.’s scheme (2009).
However, our protocol is resistant to replay as well
as gateway bypass attacks.
Table 3: Comparison of storage overhead.
Storage Overhead per User (bits)
UD GW SN
Vaidya et al.’s scheme (2009) 2304 1600 1056
The Proposed scheme 2304 1601 1088
5 CONCLUSIONS
In this paper, we have proposed a robust user
authentication scheme, which is an improved
password-based authentication method. We have
identified that Vaidya et al.’s scheme is subject to
several security flaws (2009). To overcome these
flaws, we have proposed an improved scheme that
retains all the advantages of past user authentication
schemes. Our proposed scheme resists replay, GW
node bypass and many logged in user attacks. The
scheme provides mutual authentication and resists
replay attack inherently and does not require any
network synchronization. We have modeled our
protocol using SystemC and verified different attack
scenarios. In our scheme, we have assumed that the
database is securely stored in GW node and failing
to meet this condition may make our scheme
vulnerable to stolen verifier attack. Again none of
the past schemes provides an inherent method to
detect a compromised node.
REFERENCES
Benenson, Z., Gartner, F., & Kesdogan, D., (2004). User
authentication in sensor networks, In Proc. Workshop
on Sensor Networks. Informatik.
Benenson, Z., Gedicke N., & Raivio, O., (2005). Realizing
robust user authentication in sensor networks, In Proc.
Workshop Real-World Wireless Sensor Networks,
Stockholm.
Das, M. L., (2009). Two-factor user authentication in
wireless sensor networks, IEEE Trans. Wireless
Communication, 8, 1086-1090.
IEEE Standard, 802.15.4-2003, (2003). Wireless medium
access control and physical layer specifications for
low-rate wireless personal area networks.
Khan, M. K., & Alghathbar, K., (2010). Cryptanalysis and
security improvements of two-factor user
authentication in wireless sensor networks, Sensors,
10(3) 2450-2459.
Ko, L. C., (2008). A novel dynamic user authentication
scheme for wireless sensor networks," In Proc. IEEE
ISWCS, 608-612, Reykjavik Iceland.
Lee, T. H., (2008). Simple dynamic user authentication
protocols for wireless sensor networks, IEEE Sensor
Communication, 43, 657-660.
Sastry, N., & Wagner, D., (2004). Security considerations
for IEEE 802.15.4 networks, In Proc. ACM Workshop
on Wireless Security, 32-42.
SystemC. The language for system-level modeling, design
& verification, IEEE Std. 1666-2011. Retrieved from
http://www.accellera.org/downloads/standards/System
C.
Tseng, H. R., Jan R. H., & Yang, W., (2007). An
improved dynamic user authentication scheme for
Gateway
Module
Sensor Module
Sensor Module
Sensor Module
User Module
Authentication Protocol
Specification
PECCS2013-InternationalConferenceonPervasiveandEmbeddedComputingandCommunicationSystems
40