1
|
Wali A, Ravichandran H, Das S. A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures. Adv Mater 2024:e2400661. [PMID: 38373292 DOI: 10.1002/adma.202400661] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/13/2024] [Indexed: 02/21/2024]
Abstract
User authentication is a critical aspect of any information exchange system which verifies the identities of individuals seeking access to sensitive information. Conventionally, this approachrelies on establishing robust digital signature protocols which employ asymmetric encryption techniques involving a key pair consisting of a public key and its matching private key. In this article, a user verification platform constructed using integrated circuits (ICs) with atomically thin two-dimensional (2D) monolayer molybdenum disulfide (MoS2 ) memtransistors is presented. First, generation of secure cryptographic keys is demonstrated by exploiting the inherent stochasticity of carrier trapping and detrapping at the 2D/oxide interface trap sites. Subsequently, the ability to manipulate the functionality of logical NOR is leveraged to create a secure one-way hash function which when homomorphically operated upon with NAND, XOR, OR, NOT, and AND logic circuits generate distinct digital signatures. These signatures when subsequently decrypted, verify the authenticity of the receiver while ensuring complete preservation of data integrity and confidentiality as the underlying information is never revealed. Finally, the advantages of implementing a NOR-based hashing techniques in comparison to the conventional XOR-based encryption method are established. This demonstration highlights the potential of 2D-based ICs in developing critical hardware information security primitives.
Collapse
Affiliation(s)
- Akshay Wali
- Electrical Engineering and Computer Science, Penn State University, University Park, PA, 16802, USA
| | | | - Saptarshi Das
- Electrical Engineering and Computer Science, Penn State University, University Park, PA, 16802, USA
- Engineering Science and Mechanics, Penn State University, University Park, PA, 16802, USA
- Materials Science and Engineering, Penn State University, University Park, PA, 16802, USA
- Materials Research Institute, Penn State University, University Park, PA, 16802, USA
| |
Collapse
|
2
|
Lee J, Jeong W, Lee K. Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability. Sensors (Basel) 2024; 24:1229. [PMID: 38400390 PMCID: PMC10891990 DOI: 10.3390/s24041229] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/13/2023] [Revised: 02/07/2024] [Accepted: 02/09/2024] [Indexed: 02/25/2024]
Abstract
In computer systems, user authentication technology is required to identify users who use computers. In modern times, various user authentication technologies, including strong security features based on ownership, such as certificates and security cards, have been introduced. Nevertheless, password-based authentication technology is currently mainly used due to its convenience of use and ease of implementation. However, according to Verizon's "2022 Data Breach Investigations Report", among all security incidents, security incidents caused by password exposures accounted for 82%. Hence, the security of password authentication technology is important. Consequently, this article analyzes prior research on keyboard data attacks and defense techniques to draw the fundamental reasons for keyboard data attacks and derive countermeasures. The first prior research is about stealing keyboard data, an attack that uses machine learning to steal keyboard data to overcome the limitations of a C/D bit attack. The second prior research is an attack technique that steals keyboard data more efficiently by expanding the features of machine learning used in the first prior research. In this article, based on previous research findings, we proposed a keyboard data protection technique using GAN, a Generative Adversarial Network, and verified its feasibility. To summarize the results of performance evaluation with previous research, the machine learning-based keyboard data attack based on the prior research exhibited a 96.7% attack success rate, while the study's proposed method significantly decreased the attack success rate by approximately 13%. Notably, in all experiments, the average decrease in the keyboard data classification performance ranged from a minimum of -29% to a maximum of 52%. When evaluating performance based on maximum performance, all performance indicators were found to decrease by more than 50%.
Collapse
Affiliation(s)
- Jaehyuk Lee
- Process Development Team, Fescaro, Suwon 16512, Republic of Korea;
| | - Wonbin Jeong
- Department of Information Security Engineering, Mokpo National University, Muan 58554, Republic of Korea;
| | - Kyungroul Lee
- Department of Information Security Engineering, Mokpo National University, Muan 58554, Republic of Korea;
| |
Collapse
|
3
|
Tissier EA, Berglund A, Johnson GJ, Sanzone ZA, Goodbread AP, Parker H, Lucas J, Kashmer D. Time Until Proof of Credentials Significantly Decreases With the Use of Blockchain Technology and the Document Management System. Cureus 2023; 15:e48920. [PMID: 38106736 PMCID: PMC10725327 DOI: 10.7759/cureus.48920] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/17/2023] [Accepted: 11/15/2023] [Indexed: 12/19/2023] Open
Abstract
Background and objective Physician credentialing and verification in the medical education setting are challenging for the modern workforce. The credentials verification process may be time-consuming and challenging for participants. Blockchain technology is a potential resource for authenticating records with reduced administrative burden and time spent. This study investigates whether the use of blockchain technology reduces the time until verification of a participant's credentials. Methods An anonymous letter designation was assigned to 23 medical students. All students enrolled in, and completed, a course designed and run by the Edward Via College of Osteopathic Medicine at Auburn (VCOM) as part of the routine medical education curriculum. At the completion of the training, a credentials certificate was produced, which showed course completion. The anonymous letter designation was utilized in the creation of the certificates. The letter designations were shared with an anonymous investigator. No student names were shared with the investigator. The investigator posed as an employing/credentialing entity and contacted VCOM to record the time required to verify the credentials certificate indicating course completion. The elapsed time until credentials verification was completed for each student in the current system (CS) was recorded. Subsequently, the credentials certificate was minted as a blockchain-based, non-fungible token (NFT) and uploaded to a document software management system. An investigator again posed as an employing/credentialing entity and utilized this system to verify the credentials of the 23 students in the study using the NFT system. The times elapsed until verification of credentials were recorded as the NFT pathway. Data from the NFT pathway and non-NFT pathway were compiled and reviewed. Results Data were normally distributed per the Andersen-Darling Test. A t-test (Welch's method) was performed. The mean time of 111,214 seconds (30.89 hours or 1.29 days) in the CS varied significantly from the mean time of 14 seconds in the NFT blockchain system (p<0.01). The standard deviation of 56,568 seconds in CS varied significantly from 9.9178 seconds in the NFT blockchain (p<0.01). Conclusions The NFT/blockchain system reduces the mean time until the credential verification is completed and reduces the variance seen in time until credentialing is completed. The NFT/blockchain system may significantly bring down the administrative burden and time spent in the credentialing process.
Collapse
Affiliation(s)
| | - Anapaula Berglund
- Simulation Center, Edward Via College of Osteopathic Medicine, Auburn, USA
| | | | - Zakary A Sanzone
- Simulation Center, Edward Via College of Osteopathic Medicine, Auburn, USA
| | - Anna P Goodbread
- Medical Education and Simulation, Edward Via College of Osteopathic Medicine, Tuscaloosa, USA
| | - Heath Parker
- Administration, Edward Via College of Osteopathic Medicine, Auburn, USA
| | - John Lucas
- Simulation Center, Edward Via College of Osteopathic Medicine, Blacksburg, USA
| | - David Kashmer
- Simulation Center, Edward Via College of Osteopathic Medicine, Auburn, USA
| |
Collapse
|
4
|
Asghar I, Khan MA, Ahmad T, Ullah S, Mansoor ul Hassan K, Buriro A. Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks. Sensors (Basel) 2023; 23:7268. [PMID: 37631804 PMCID: PMC10459229 DOI: 10.3390/s23167268] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/14/2023] [Revised: 08/14/2023] [Accepted: 08/18/2023] [Indexed: 08/27/2023]
Abstract
In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments.
Collapse
Affiliation(s)
- Iqra Asghar
- Department of Cybersecurity, Air University Islamabad, Islamabad 44000, Pakistan; (I.A.); (K.M.u.H.)
| | - Muhammad Ayaz Khan
- Department of Computer Science, Air University Islamabad, Islamabad 44000, Pakistan;
| | - Tahir Ahmad
- Center for Cybersecurity, Brunno Kessler Foundation, 38123 Trento, Italy
| | - Subhan Ullah
- Faculty of Computer Science, National University of Computer and Emerging Sciences (NUCES-FAST), Islamabad 44000, Pakistan;
| | - Khwaja Mansoor ul Hassan
- Department of Cybersecurity, Air University Islamabad, Islamabad 44000, Pakistan; (I.A.); (K.M.u.H.)
| | - Attaullah Buriro
- Faculty of Engineering, Free University Bozen-Bolzano, 39100 Bolzano, Italy
| |
Collapse
|
5
|
AbdelRaouf H, Chelloug SA, Muthanna A, Semary N, Amin K, Ibrahim M. Efficient Convolutional Neural Network-Based Keystroke Dynamics for Boosting User Authentication. Sensors 2023; 23:4898. [PMID: 37430812 DOI: 10.3390/s23104898] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/22/2023] [Revised: 05/13/2023] [Accepted: 05/16/2023] [Indexed: 07/12/2023]
Abstract
The safeguarding of online services and prevention of unauthorized access by hackers rely heavily on user authentication, which is considered a crucial aspect of security. Currently, multi-factor authentication is used by enterprises to enhance security by integrating multiple verification methods rather than relying on a single method of authentication, which is considered less secure. Keystroke dynamics is a behavioral characteristic used to evaluate an individual's typing patterns to verify their legitimacy. This technique is preferred because the acquisition of such data is a simple process that does not require any additional user effort or equipment during the authentication process. This study proposes an optimized convolutional neural network that is designed to extract improved features by utilizing data synthesization and quantile transformation to maximize results. Additionally, an ensemble learning technique is used as the main algorithm for the training and testing phases. A publicly available benchmark dataset from Carnegie Mellon University (CMU) was utilized to evaluate the proposed method, achieving an average accuracy of 99.95%, an average equal error rate (EER) of 0.65%, and an average area under the curve (AUC) of 99.99%, surpassing recent advancements made on the CMU dataset.
Collapse
Affiliation(s)
- Hussien AbdelRaouf
- Department of Information Technology, Faculty of Computers and Information, Menoufia University, Shebin El-Kom 32511, Menoufia, Egypt
| | - Samia Allaoua Chelloug
- Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
| | - Ammar Muthanna
- Department of Applied Probability and Informatics, RUDN University, 6 Miklukho-Maklaya St, Moscow 117198, Russia
| | - Noura Semary
- Department of Information Technology, Faculty of Computers and Information, Menoufia University, Shebin El-Kom 32511, Menoufia, Egypt
| | - Khalid Amin
- Department of Information Technology, Faculty of Computers and Information, Menoufia University, Shebin El-Kom 32511, Menoufia, Egypt
| | - Mina Ibrahim
- Department of Information Technology, Faculty of Computers and Information, Menoufia University, Shebin El-Kom 32511, Menoufia, Egypt
| |
Collapse
|
6
|
Agrawal V, Hazratifard M, Elmiligi H, Gebali F. Electrocardiogram (ECG)-Based User Authentication Using Deep Learning Algorithms. Diagnostics (Basel) 2023; 13. [PMID: 36766544 DOI: 10.3390/diagnostics13030439] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/07/2022] [Revised: 01/03/2023] [Accepted: 01/11/2023] [Indexed: 01/27/2023] Open
Abstract
Personal authentication security is an essential area of research in privacy and cybersecurity. For individual verification, fingerprint and facial recognition have proved particularly useful. However, such technologies have flaws such as fingerprint fabrication and external impediments. Different AI-based technologies have been proposed to overcome forging or impersonating authentication concerns. Electrocardiogram (ECG)-based user authentication has recently attracted considerable curiosity from researchers. The Electrocardiogram is among the most reliable advanced techniques for authentication since, unlike other biometrics, it confirms that the individual is real and alive. This study utilizes a user authentication system based on electrocardiography (ECG) signals using deep learning algorithms. The ECG data are collected from users to create a unique biometric profile for each individual. The proposed methodology utilizes Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) to analyze the ECG data. The CNNs are trained to extract features from the ECG data, while the LSTM networks are used to model the temporal dependencies in the data. The evaluation of the performance of the proposed system is conducted through experiments. It demonstrates that it effectively identifies users based on their ECG data, achieving high accuracy rates. The suggested techniques obtained an overall accuracy of 98.34% for CNN and 99.69% for LSTM using the Physikalisch-Technische Bundesanstalt (PTB) database. Overall, the proposed system offers a secure and convenient method for user authentication using ECG data and deep learning algorithms. The approach has the potential to provide a secure and convenient method for user authentication in various applications.
Collapse
|
7
|
Kim K, Ryu J, Lee Y, Won D. An Improved Lightweight User Authentication Scheme for the Internet of Medical Things. Sensors (Basel) 2023; 23:1122. [PMID: 36772160 PMCID: PMC9920152 DOI: 10.3390/s23031122] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2022] [Revised: 01/15/2023] [Accepted: 01/15/2023] [Indexed: 06/18/2023]
Abstract
The Internet of Medical Things (IoMT) is used in the medical ecosystem through medical IoT sensors, such as blood glucose, heart rate, temperature, and pulse sensors. To maintain a secure sensor network and a stable IoMT environment, it is important to protect the medical IoT sensors themselves and the patient medical data they collect from various security threats. Medical IoT sensors attached to the patient's body must be protected from security threats, such as being controlled by unauthorized persons or transmitting erroneous medical data. In IoMT authentication, it is necessary to be sensitive to the following attack techniques. (1) The offline password guessing attack easily predicts a healthcare administrator's password offline and allows for easy access to the healthcare worker's account. (2) Privileged-insider attacks executed through impersonation are an easy way for an attacker to gain access to a healthcare administrator's environment. Recently, previous research proposed a lightweight and anonymity preserving user authentication scheme for IoT-based healthcare. However, this scheme was vulnerable to offline password guessing, impersonation, and privileged insider attacks. These attacks expose not only the patients' medical data such as blood pressure, pulse, and body temperature but also the patients' registration number, phone number, and guardian. To overcome these weaknesses, in the present study we propose an improved lightweight user authentication scheme for the Internet of Medical Things (IoMT). In our scheme, the hash function and XOR operation are used for operation in low-spec healthcare IoT sensor. The automatic cryptographic protocol tool ProVerif confirmed the security of the proposed scheme. Finally, we show that the proposed scheme is more secure than other protocols and that it has 266.48% better performance than schemes that have been previously described in other studies.
Collapse
Affiliation(s)
- Keunok Kim
- Department of Electrical and Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Republic of Korea
| | - Jihyeon Ryu
- Department of Computer Science and Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Republic of Korea
| | - Youngsook Lee
- Department of IT Software Security, Howon University, 64 Impi-myeon, Howondae 3-gil, Gunsan-si 54058, Republic of Korea
| | - Dongho Won
- Department of Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Republic of Korea
| |
Collapse
|
8
|
Hernández-Álvarez L, Barbierato E, Caputo S, Mucchi L, Hernández Encinas L. EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers. Sensors (Basel) 2022; 23:186. [PMID: 36616785 PMCID: PMC9823500 DOI: 10.3390/s23010186] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/21/2022] [Revised: 12/15/2022] [Accepted: 12/20/2022] [Indexed: 06/17/2023]
Abstract
In the current Information Age, it is usual to access our personal and professional information, such as bank account data or private documents, in a telematic manner. To ensure the privacy of this information, user authentication systems should be accurately developed. In this work, we focus on biometric authentication, as it depends on the user's inherent characteristics and, therefore, offers personalized authentication systems. Specifically, we propose an electrocardiogram (EEG)-based user authentication system by employing One-Class and Multi-Class Machine Learning classifiers. In this sense, the main novelty of this article is the introduction of Isolation Forest and Local Outlier Factor classifiers as new tools for user authentication and the investigation of their suitability with EEG data. Additionally, we identify the EEG channels and brainwaves with greater contribution to the authentication and compare them with the traditional dimensionality reduction techniques, Principal Component Analysis, and χ2 statistical test. In our final proposal, we elaborate on a hybrid system resistant to random forgery attacks using an Isolation Forest and a Random Forest classifiers, obtaining a final accuracy of 82.3%, a precision of 91.1% and a recall of 75.3%.
Collapse
Affiliation(s)
- Luis Hernández-Álvarez
- Computer Security Lab, Universidad Carlos III de Madrid, 28911 Leganés, Spain
- Institute of Physical and Information Technologies, Spanish National Research Council, 28006 Madrid, Spain
| | - Elena Barbierato
- Department of Agriculture, Food, Environment and Forestry, University of Florence, 50144 Firenze, Italy
| | - Stefano Caputo
- Department of Information Engineering, University of Florence, 50139 Firenze, Italy
| | - Lorenzo Mucchi
- Department of Information Engineering, University of Florence, 50139 Firenze, Italy
| | - Luis Hernández Encinas
- Institute of Physical and Information Technologies, Spanish National Research Council, 28006 Madrid, Spain
| |
Collapse
|
9
|
Tyagi P, Kumari S, Alzahrani BA, Gupta A, Yang MH. An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT. Sensors (Basel) 2022; 22:8793. [PMID: 36433388 PMCID: PMC9698520 DOI: 10.3390/s22228793] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/18/2022] [Revised: 11/10/2022] [Accepted: 11/10/2022] [Indexed: 06/16/2023]
Abstract
A security protocol for wireless transmission is essential to defend sensitive information from malicious enemies by providing a variety of facilities such as privacy of the user's information, secure session key, associated authentication, and user-repeal facility when a person's authorizations are suddenly disclosed. Singh et al. proposed an improved user authentication and key agreement system for wireless sensor networks (WSNs). Authors are sure that their protocol is secure from various attacks. Here, we find several security pitfalls in their scheme, such as an offline password-guessing attack, failure to protect the session key, and a man-in-the-middle attack. To remove the identified pitfalls found in Singh et al.'s scheme, we design an enhanced authentication scheme for WSNs tailored for IoT. We prove the reliability of our proposed protocol using the real or random (RoR) model. We also evaluate the proposed scheme with the associated schemes and show its superior efficacy as compared to its counterparts.
Collapse
Affiliation(s)
- Pooja Tyagi
- Department of Mathematics, Chaudhary Charan Singh University, Meerut 250004, India
| | - Saru Kumari
- Department of Mathematics, Chaudhary Charan Singh University, Meerut 250004, India
| | - Bander A. Alzahrani
- Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
| | - Anshay Gupta
- Department of Computer Science and Engineering, HMR Institute of Technology and Management, New Delhi 110036, India
| | - Ming-Hour Yang
- Department of Information and Computer Engineering, Chung Yuan Christian University, Taoyuan 320314, Taiwan
| |
Collapse
|
10
|
Stergiadis C, Kostaridou VD, Veloudis S, Kazis D, Klados MA. A Personalized User Authentication System Based on EEG Signals. Sensors (Basel) 2022; 22:6929. [PMID: 36146276 PMCID: PMC9503240 DOI: 10.3390/s22186929] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/14/2022] [Revised: 09/05/2022] [Accepted: 09/06/2022] [Indexed: 06/16/2023]
Abstract
Conventional biometrics have been employed in high-security user-authentication systems for over 20 years now. However, some of these modalities face low-security issues in common practice. Brainwave-based user authentication has emerged as a promising alternative method, as it overcomes some of these drawbacks and allows for continuous user authentication. In the present study, we address the problem of individual user variability, by proposing a data-driven Electroencephalography (EEG)-based authentication method. We introduce machine learning techniques, in order to reveal the optimal classification algorithm that best fits the data of each individual user, in a fast and efficient manner. A set of 15 power spectral features (delta, theta, lower alpha, higher alpha, and alpha) is extracted from three EEG channels. The results show that our approach can reliably grant or deny access to the user (mean accuracy of 95.6%), while at the same time poses a viable option for real-time applications, as the total time of the training procedure was kept under one minute.
Collapse
Affiliation(s)
- Christos Stergiadis
- Department of Psychology, City College, University of York Europe Campus, 54622 Thessaloniki, Greece
- Neuroscience Research Center (NEUREC), City College, University of York Europe Campus, 54622 Thessaloniki, Greece
| | | | - Simos Veloudis
- Department of Computer Science, City College, University of York Europe Campus, 54622 Thessaloniki, Greece
| | - Dimitrios Kazis
- 3rd Department of Neurology, Aristotle University of Thessaloniki, Exochi, 57010 Thessaloniki, Greece
| | - Manousos A. Klados
- Department of Psychology, City College, University of York Europe Campus, 54622 Thessaloniki, Greece
- Neuroscience Research Center (NEUREC), City College, University of York Europe Campus, 54622 Thessaloniki, Greece
| |
Collapse
|
11
|
Wang X, Shi Y, Zheng K, Zhang Y, Hong W, Cao S. User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes. Sensors (Basel) 2022; 22:6627. [PMID: 36081085 PMCID: PMC9460698 DOI: 10.3390/s22176627] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/28/2022] [Revised: 08/21/2022] [Accepted: 08/31/2022] [Indexed: 06/15/2023]
Abstract
In order to improve user authentication accuracy based on keystroke dynamics and mouse dynamics in hybrid scenes and to consider the user operation changes in different scenes that aggravate user status changes and make it difficult to simulate user behaviors, we present a user authentication method entitled SIURUA. SIURUA uses scene-irrelated features and user-related features for user identification. First, features are extracted based on keystroke data and mouse movement data. Next, scene-irrelated features that have a low correlation with scenes are obtained. Finally, scene-irrelated features are fused with user-related features to ensure the integrity of the features. Experimental results show that the proposed method has the advantage of improving user authentication accuracy in hybrid scenes, with an accuracy of 84% obtained in the experiment.
Collapse
Affiliation(s)
- Xiujuan Wang
- Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
| | - Yutong Shi
- Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
| | - Kangfeng Zheng
- School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
| | - Yuyang Zhang
- Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
| | - Weijie Hong
- Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
| | - Siwei Cao
- Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
| |
Collapse
|
12
|
Choi K, Ryu H, Kim J. Deep Residual Networks for User Authentication via Hand-Object Manipulations. Sensors (Basel) 2021; 21:s21092981. [PMID: 33922833 PMCID: PMC8122988 DOI: 10.3390/s21092981] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/13/2021] [Revised: 04/05/2021] [Accepted: 04/21/2021] [Indexed: 11/16/2022]
Abstract
With the ubiquity of wearable devices, various behavioural biometrics have been exploited for continuous user authentication during daily activities. However, biometric authentication using complex hand behaviours have not been sufficiently investigated. This paper presents an implicit and continuous user authentication model based on hand-object manipulation behaviour, using a finger-and hand-mounted inertial measurement unit (IMU)-based system and state-of-the-art deep learning models. We employed three convolutional neural network (CNN)-based deep residual networks (ResNets) with multiple depths (i.e., 50, 101, and 152 layers) and two recurrent neural network (RNN)-based long short-term memory (LSTMs): simple and bidirectional. To increase ecological validity, data collection of hand-object manipulation behaviours was based on three different age groups and simple and complex daily object manipulation scenarios. As a result, both the ResNets and LSTMs models acceptably identified users’ hand behaviour patterns, with the best average accuracy of 96.31% and F1-score of 88.08%. Specifically, in the simple hand behaviour authentication scenarios, more layers in residual networks tended to show better performance without showing conventional degradation problems (the ResNet-152 > ResNet-101 > ResNet-50). In a complex hand behaviour scenario, the ResNet models outperformed user authentication compared to the LSTMs. The 152-layered ResNet and bidirectional LSTM showed an average false rejection rate of 8.34% and 16.67% and an equal error rate of 1.62% and 9.95%, respectively.
Collapse
|
13
|
Lee K, Lee SY. Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication. Entropy (Basel) 2020; 22:E355. [PMID: 33286129 DOI: 10.3390/e22030355] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/09/2020] [Revised: 03/10/2020] [Accepted: 03/17/2020] [Indexed: 11/16/2022]
Abstract
The objective of this study was to verify the feasibility of mouse data exposure by deriving features to improve the accuracy of a mouse data attack technique using machine learning models. To improve the accuracy, the feature appearing between the mouse coordinates input from the user was analyzed, which is defined as a feature for machine learning models to derive a method of improving the accuracy. As a result, we found a feature where the distance between the coordinates is concentrated in a specific range. We verified that the mouse data is apt to being stolen more accurately when the distance is used as a feature. An accuracy of over 99% was achieved, which means that the proposed method almost completely classifies the mouse data input from the user and the mouse data generated by the defender.
Collapse
|
14
|
Chen CY, Hsu YC, Lin CC, Hajiyev J, Su CR, Tseng CH. Study of Out-Of-Hospital Access to HIS System: A Security Perspective. Sensors (Basel) 2019; 19:E2628. [PMID: 31185624 DOI: 10.3390/s19112628] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/25/2019] [Revised: 06/05/2019] [Accepted: 06/05/2019] [Indexed: 11/18/2022]
Abstract
In light of the need for Extramural Hospital Information System (HIS) access through mobile devices outside the hospital, this research analyzes situational information security threats, including the circumstances in which a mobile device may get lost and personal data may be stolen. Moreover, the system needs to be implemented in accordance with the regulations. Based on the security threat analysis, it is proposed to use a security control module to provide a security-enabled HIS proxy module, two-way authentication module, and One-Time Password (OTP). The sending module and cryptographic technology computing module with Micro SD encryption card form a set of HIS extension system, which includes the SMS OTP method to simultaneously verify the two-way authentication mechanism of a user and the device that the user owns.
Collapse
|
15
|
Ryu J, Lee H, Kim H, Won D. Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks. Sensors (Basel) 2018; 18:s18124481. [PMID: 30567374 PMCID: PMC6308603 DOI: 10.3390/s18124481] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/08/2018] [Revised: 12/12/2018] [Accepted: 12/14/2018] [Indexed: 12/02/2022]
Abstract
Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.’s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks.
Collapse
Affiliation(s)
- Jihyeon Ryu
- Department of Platform Software, Sungkyunkwan University, Gyeonggi-do 16419, Korea.
| | - Hakjun Lee
- Department of Electrical and Computer Engineering, Sungkyunkwan University, Gyeonggi-do 16419, Korea.
| | - Hyoungshick Kim
- Department of Computer Engineering, Sungkyunkwan University, Gyeonggi-do 16419, Korea.
| | - Dongho Won
- Department of Computer Engineering, Sungkyunkwan University, Gyeonggi-do 16419, Korea.
| |
Collapse
|
16
|
Wang C, Xu G, Sun J. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks. Sensors (Basel) 2017; 17:E2946. [PMID: 29257066 DOI: 10.3390/s17122946] [Citation(s) in RCA: 45] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/11/2017] [Revised: 12/01/2017] [Accepted: 12/04/2017] [Indexed: 11/16/2022]
Abstract
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.
Collapse
|
17
|
Li CT, Wu TY, Chen CL, Lee CC, Chen CM. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors (Basel) 2017. [PMID: 28644381 PMCID: PMC5551096 DOI: 10.3390/s17071482] [Citation(s) in RCA: 72] [Impact Index Per Article: 10.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
Collapse
Affiliation(s)
- Chun-Ta Li
- Department of Information Management, Tainan University of Technology, 529 Zhongzheng Road, Tainan 71002, Taiwan.
| | - Tsu-Yang Wu
- Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou 350118, China.
- National Demonstration Center for Experimental Electronic Information and Electrical Technology Education, Fujian University of Technology, 3 Xueyuan Road, Fuzhou 350118, China.
| | - Chin-Ling Chen
- Department of Computer Science and Information Engineering, Chaoyang University of Technology, 168 Jifeng East Road, Taichung 41349, Taiwan.
- School of Information Engineering, Changchun University of Technology, Changchun 130600, China.
| | - Cheng-Chi Lee
- Department of Library and Information Science, Fu Jen Catholic University, 510 Jhongjheng Road, New Taipei 24205, Taiwan.
- Department of Photonics and Communication Engineering, Asia University, 500 Lioufeng Road, Taichung 41354, Taiwan.
| | - Chien-Ming Chen
- Harbin Institute of Technology Shenzhen Graduate School, Shenzhen University Town, Xili, Nanshan District, Shenzhen 518055, China.
| |
Collapse
|
18
|
Moon J, Lee D, Lee Y, Won D. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks. Sensors (Basel) 2017; 17:s17050940. [PMID: 28441331 PMCID: PMC5461064 DOI: 10.3390/s17050940] [Citation(s) in RCA: 21] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/08/2017] [Revised: 03/30/2017] [Accepted: 04/04/2017] [Indexed: 11/16/2022]
Abstract
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.
Collapse
Affiliation(s)
- Jongho Moon
- Department of Electrical and Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si, Gyeonggi-do 16419, Korea.
| | - Donghoon Lee
- Department of Electrical and Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si, Gyeonggi-do 16419, Korea.
| | - Youngsook Lee
- Department of Cyber Security, Howon University, 64 Howondae 3-gil, Impi-myeon, Gunsan-si, Jeonrabuk-do 54058, Korea.
| | - Dongho Won
- Department of Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si, Gyeonggi-do 16419, Korea.
| |
Collapse
|
19
|
Park Y, Park Y. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks. Sensors (Basel) 2016; 16:E2123. [PMID: 27983616 DOI: 10.3390/s16122123] [Citation(s) in RCA: 27] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/19/2016] [Revised: 12/09/2016] [Accepted: 12/12/2016] [Indexed: 11/17/2022]
Abstract
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
Collapse
|
20
|
Shen C, Yu T, Yuan S, Li Y, Guan X. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones. Sensors (Basel) 2016; 16:E345. [PMID: 27005626 DOI: 10.3390/s16030345] [Citation(s) in RCA: 37] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/07/2016] [Revised: 02/24/2016] [Accepted: 03/03/2016] [Indexed: 11/22/2022]
Abstract
The growing trend of using smartphones as personal computing platforms to access and store private information has stressed the demand for secure and usable authentication mechanisms. This paper investigates the feasibility and applicability of using motion-sensor behavior data for user authentication on smartphones. For each sample of the passcode, sensory data from motion sensors are analyzed to extract descriptive and intensive features for accurate and fine-grained characterization of users’ passcode-input actions. One-class learning methods are applied to the feature space for performing user authentication. Analyses are conducted using data from 48 participants with 129,621 passcode samples across various operational scenarios and different types of smartphones. Extensive experiments are included to examine the efficacy of the proposed approach, which achieves a false-rejection rate of 6.85% and a false-acceptance rate of 5.01%. Additional experiments on usability with respect to passcode length, sensitivity with respect to training sample size, scalability with respect to number of users, and flexibility with respect to screen size were provided to further explore the effectiveness and practicability. The results suggest that sensory data could provide useful authentication information, and this level of performance approaches sufficiency for two-factor authentication on smartphones. Our dataset is publicly available to facilitate future research.
Collapse
|
21
|
Chen H, Ge L, Xie L. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks. Sensors (Basel) 2015; 15:17057-75. [PMID: 26184224 PMCID: PMC4541922 DOI: 10.3390/s150717057] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/07/2015] [Revised: 07/04/2015] [Accepted: 07/10/2015] [Indexed: 11/30/2022]
Abstract
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.
Collapse
Affiliation(s)
- Huifang Chen
- Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China.
- Zhejiang Provincial Key Laboratory of Information Network Technology, Hangzhou 310027, China.
| | - Linlin Ge
- Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China.
| | - Lei Xie
- Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China.
- Zhejiang Provincial Key Laboratory of Information Network Technology, Hangzhou 310027, China.
| |
Collapse
|
22
|
Kumar P, Lee SG, Lee HJ. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors (Basel) 2012; 12:1625-47. [PMID: 22438729 PMCID: PMC3304131 DOI: 10.3390/s120201625] [Citation(s) in RCA: 102] [Impact Index Per Article: 8.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/29/2011] [Revised: 01/13/2012] [Accepted: 02/02/2012] [Indexed: 11/14/2022]
Abstract
A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.
Collapse
Affiliation(s)
- Pardeep Kumar
- Department of Ubiquitous-IT, Graduate School of Design & IT, Dongseo University, Sasang-Gu, Busan 617-716, Korea; E-Mail:
| | - Sang-Gon Lee
- Division of Computer & Information Engineering, Dongseo University, San 69-1, Jurye-2-Dong, Sasang-Gu, Busan 617-716, Korea; E-Mail: (S.-G.L.)
| | - Hoon-Jae Lee
- Division of Computer & Information Engineering, Dongseo University, San 69-1, Jurye-2-Dong, Sasang-Gu, Busan 617-716, Korea; E-Mail: (S.-G.L.)
- Author to whom correspondence should be addressed; E-Mail: ; Tel.: +82-51-320-1730; Fax: +82-51-327-8955
| |
Collapse
|
23
|
Kumar P, Choudhury AJ, Sain M, Lee SG, Lee HJ. RUASN: a robust user authentication framework for wireless sensor networks. Sensors (Basel) 2011; 11:5020-46. [PMID: 22163888 PMCID: PMC3231354 DOI: 10.3390/s110505020] [Citation(s) in RCA: 32] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/25/2011] [Revised: 04/17/2011] [Accepted: 04/20/2011] [Indexed: 11/16/2022]
Abstract
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
Collapse
Affiliation(s)
- Pardeep Kumar
- Department of Ubiquitous-IT, Graduate School of Design & IT, Dongseo University, Sasang-Gu, Busan 617-716, Korea; E-Mails: (P.K.); (A.J.C.); (M.S.)
| | - Amlan Jyoti Choudhury
- Department of Ubiquitous-IT, Graduate School of Design & IT, Dongseo University, Sasang-Gu, Busan 617-716, Korea; E-Mails: (P.K.); (A.J.C.); (M.S.)
| | - Mangal Sain
- Department of Ubiquitous-IT, Graduate School of Design & IT, Dongseo University, Sasang-Gu, Busan 617-716, Korea; E-Mails: (P.K.); (A.J.C.); (M.S.)
| | - Sang-Gon Lee
- Division of Computer & Information Eng, Dongseo University. San 69-1, Jurye-2-Dong, Sasang-Gu, Busan 617-716, Korea; E-Mail:
- Author to whom correspondence should be addressed; E-Mail: ; Tel.: +82-51-320-1730; Fax: +82-51-327-8955
| | - Hoon-Jae Lee
- Division of Computer & Information Eng, Dongseo University. San 69-1, Jurye-2-Dong, Sasang-Gu, Busan 617-716, Korea; E-Mail:
| |
Collapse
|