Skip to main content
Log in

Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The wireless sensor networks have several applications in different areas like medical, military, industry, safety, etc. Recently, Kumari and Om have discussed an authentication protocol for wireless sensor networks in coal mines for safety monitoring. In this paper, we cryptanalyze their scheme and find that it is vulnerable to the smart card loss attack, stolen verifier attack, and denial of service attack, besides other problems: (1) user traceability and (2) the sensor nodes are not anonymous. Here, we purpose an improved scheme by overcoming these limitations. We formally show the security analysis of our proposed scheme using random oracle and its security verification using the AVISPA tool. We carry out its informal analysis to show its resistivity to various known attacks. It requires less computational and storage costs, and is more secured than the related schemes. We also show its practical demonstration using NS2 simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Carlson J, Han R, Lao S, Narayan C, Sanghani S (2003) Rapid prototyping of mobile input devices using wireless sensor nodes. In: Mobile computing systems and applications, 2003. Proceedings. Fifth IEEE Workshop on, IEEE, pp 21–29

  • Chandrakar P, Om H (2017) A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC. Comput Commun 110:26–34

    Article  Google Scholar 

  • Chen J, Salim MB, Matsumoto M (2011) A single mobile target tracking in voronoi-based clustered wireless sensor network. J Inf Process Syst 7(1):17–28

    Article  Google Scholar 

  • Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10,081–10,106

    Article  Google Scholar 

  • Claycomb WR, Shin D (2011) A novel node level security policy framework for wireless sensor networks. J Netw Comput Appl 34(1):418–428

    Article  Google Scholar 

  • Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1). https://doi.org/10.1002/dac.2933

  • Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur Commun Netw 9(13):2070–2092

    Google Scholar 

  • Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090

    Article  Google Scholar 

  • Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MathSciNet  MATH  Google Scholar 

  • Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132

    Article  Google Scholar 

  • Gope P, Lee J, Quek TQ (2016) Resilience of dos attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens J 17(2):498–503

    Article  Google Scholar 

  • Guha A, Kumar KV (2012) Structural controls on coal fire distributionsremote sensing based investigation in the Raniganj coalfield, West Bengal. J Geol Soc India 79(5):467–475

    Article  Google Scholar 

  • He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371

    Google Scholar 

  • He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015a) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49–60

    Article  Google Scholar 

  • He D, Kumar N, Chilamkurti N (2015b) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci 321:263–277

    Article  Google Scholar 

  • Huang HF, Chang YF, Liu CH (2010) Enhancement of two-factor user authentication in wireless sensor networks. In: Intelligent information hiding and multimedia signal processing (IIH-MSP), 2010 sixth international conference on, IEEE, pp 27–30

  • Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017a) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electr Eng

  • Jiang Q, Zeadally S, Ma J, He D (2017b) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392

    Article  Google Scholar 

  • Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459

    Article  Google Scholar 

  • Kilinc HH, Yanik T (2014) A survey of sip authentication and key agreement schemes. IEEE Commun Surv Tutor 16(2):1005–1023

    Article  Google Scholar 

  • Ko LC (2008) A novel dynamic user authentication scheme for wireless sensor networks. In: 2008 IEEE international symposium on wireless communication systems, IEEE, pp 608–612

  • Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual international cryptology conference, Springer, pp 388–397

  • Kumar A, Kingson T, Verma R, Mandal R, Dutta S, Chaulya S, Prasad G (2013) Application of gas monitoring sensors in underground coal mines and hazardous areas. Int J Comput Technol Electron Eng 3(3):9–23

    Google Scholar 

  • Kumar D, Aseri TC, Patel R (2011) Multi-hop communication routing (mcr) protocol for heterogeneous wireless sensor networks. Int J Inf Technol Commun Converg 1(2):130–145

    Google Scholar 

  • Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647

    Article  Google Scholar 

  • Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154

    Article  Google Scholar 

  • Li B, Batten L (2009) Using mobile agents to recover from node and database compromise in path-based dos attacks in wireless sensor networks. J Netw Comput Appl 32(2):377–387

    Article  Google Scholar 

  • Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589–9603

    Article  Google Scholar 

  • Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur Commun Netw 9:2643–2655

    Article  Google Scholar 

  • Liu Z, Li C, Wu D, Dai W, Geng S, Ding Q (2010) A wireless sensor network based personnel positioning scheme in coal mines with blind areas. Sensors 10(11):9891–9918

    Article  Google Scholar 

  • Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552

    Article  MathSciNet  MATH  Google Scholar 

  • Shnayder V, Hempstead M, Chen Br, Allen GW, Welsh M (2004) Simulating the power consumption of large-scale sensor network applications. In: Proceedings of the 2nd international conference on Embedded networked sensor systems, ACM, pp 188–200

  • Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE global telecommunications conference, IEEE, pp 986–990

  • Vaidya B, Rodrigues JJ, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in ngn. Int J Commun Syst 23(9–10):1201–1222

    Article  Google Scholar 

  • Wang D, Wang P (2016) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2016.2605087

    Google Scholar 

  • Wang J, Liu T, Song G, Xie H, Li L, Deng X, Gong Z (2014) Fiber bragg grating (fbg) sensors used in coal mines. Photonic Sens 4(2):120–124

    Article  Google Scholar 

  • Wong KH, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), IEEE, vol 1, p 8

  • Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323

    Article  Google Scholar 

  • Zhao G (2011) Wireless sensor networks for industrial process monitoring and control: a survey. Netw Protoc Algorithms 3(1):46–63

    Google Scholar 

  • Zhao G, Kumar A (2011) Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks. Int J Inf Technol Commun Converg 1(3):297–317

    Google Scholar 

Download references

Acknowledgements

This work is supported by UPE-II, Jawaharlal Nehru University, New Delhi.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Devender Kumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, D., Chand, S. & Kumar, B. Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J Ambient Intell Human Comput 10, 641–660 (2019). https://doi.org/10.1007/s12652-018-0712-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-0712-8

Keywords

Navigation