Shahed University

Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography

Majid Bayat | Morteza Barari | Mohammad Beheshti Atashgah | Mohammad Reza Aref

URL :   http://research.shahed.ac.ir/WSR/WebPages/Report/PaperView.aspx?PaperID=116600
Date :  2019/06/16
Publish in :    International Journal of Network Security

Link :  http://ijns.jalaxy.com.tw/download_paper.jsp?PaperID=IJNS-2018-07-10-2&PaperName=ijns-v22-n6/ijns-2020-v22-n6-p872-0.pdf
Keywords :Authentication, Internet of Things, ProVerif Security, WSN

Abstract :
The concept of Internet of Things (IoT) is that objects and things via the Internet infrastructure can interconnect into a global dynamic extended network. In order to catch the final goal, IoT takes advantages of other useful technologies like RFIDs, WSNs, M2M communications, big data and cloud computing. Wireless Sensor Networks (WSNs) is one of the main parts of IoT’s building blocks which can be used in almost all scopes of the IoT’s applications. Because of the importance of the WSN’s security, researchers are already working on new and efficient techniques on its different security schemes and protocols such as user authentication schemes. Recently, Wu et al. proposed a new user authentication scheme for Internet of Things-based wireless sensor networks. The scheme suggests a new method in which a user of IoT can be authenticated with a sensor node of the WSN through a communication with a gateway. Unfortunately, we have found that Wu et al.’s scheme has some security vulnerabilities and is not immune to some security attacks. This paper focuses on eliminating the security vulnerabilities of Wu et al.’s scheme by suggesting an enhanced scheme. We introduce a provable security for our scheme and present its formal security analysis by ProVerif. Moreover, we compare the proposed scheme with some other related schemes for WSNs in aspects of efficiency and security.