Next Article in Journal
A Diffusion Model-Based Character Synthesis Using a Blank Face
Previous Article in Journal
An Adaptive Multimodal Fusion Network Based on Multilinear Gradients for Visual Question Answering
Previous Article in Special Issue
Deep Reinforcement Learning Recommendation System Algorithm Based on Multi-Level Attention Mechanisms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF

by
Jiaqing Mo
1,*,
Zhihua Zhang
2 and
Yuhua Lin
2
1
School of Computer Science and Software, Zhaoqing University, Zhaoqing 526061, China
2
Center of Modern Educational Technology, Zhaoqing University, Zhaoqing 526061, China
*
Author to whom correspondence should be addressed.
Submission received: 8 November 2024 / Revised: 14 December 2024 / Accepted: 20 December 2024 / Published: 24 December 2024
(This article belongs to the Special Issue Emerging Distributed/Parallel Computing Systems)

Abstract

:
In a distributed wireless sensor network (DWSN), sensors continuously perceive the environment, collect data, and transmit it to remote users through the network so as to realize real-time monitoring of the environment or specific targets. However, given the openness of wireless channels and the sensitivity of collecting data, designing a robust user authentication protocol to ensure the legitimacy of user and sensors in such DWSN environments faces serious challenges. Most of the current authentication schemes fail to meet some important and often overlooked security features, such as resisting physical impersonation attack, resisting smartcard loss attack, and providing forward secrecy. In this work, we put forward a practically secure two-factor authentication scheme using a physically unclonable function to prevent a physical impersonation attack and sensor node capture attack, utilize Chebyshev chaotic mapping to provide forward secrecy, and improve the efficiency and security of session key negotiation. Furthermore, we use the fuzzy verifier technique to prevent attackers from offline guessing attacks to resist smartcard loss attacks. In addition, a BAN logic proof and heuristic security analysis show that the scheme achieves mutual authentication and key agreement as well as prevents known attacks. A comparative analysis with state-of-the-art schemes shows that the proposal not only achieves desired security features but also maintains better efficiency.

1. Introduction

The development of microelectronics technology, computing technology, and wireless transmission technologies has promoted the rapid development of low-power multifunctional sensors for integrating various functions such as information collection, environmental sensing, and wireless communication in miniaturized volumes [1]. A distributed wireless sensor network consists of users, gateways, and many static or mobile microsensors that form a multihop self-organizing network through wireless communication, realize data collection and data aggregation, and transmit the data through a wireless channel by a gateway to a remote user for further analysis and processing [2]; its architecture is shown in Figure 1. A DWSN has a wide range of application scenarios, such as industrial Internet of Things [3], wireless medical sensor networks [4], smart homes [5], mine monitoring [6], etc. Note that since a WSN is the foundation of a DWSN, this paper also discusses the security of a WSN in the related works section. In a DSWN, wireless sensors are characterized by limited energy, computing power, and transmission bandwidth, and they are typically deployed in unmanned or harsh environments. Because the data gathered by wireless sensors are often important and sensitive and are transmitted wirelessly, it is easy for attackers to launch malicious attacks, such as eavesdropping, blocking, tampering, and replaying, during the communication process [7,8]. In a DWSN, the most serious case is that the node is subjected to a physical impersonation attack. By capturing the wireless sensor node in the network, the attacker obtains all the information (including the key) in the node, clones it, disguises it as a legitimate node, and participates in various network activities. Due to its legitimate information, the cloned node cannot be identified by ordinary security authentication methods. Although IEEE 802.15.4 provides some security services for the lower layers of the WSN stack, it also has some security defects [9]. Moreover, the openness of wireless networks and the scanty resources of wireless sensors make it necessary to establish appropriate authentication and key agreement mechanisms at the application layer to ensure secure communication between legitimate users and the sensors.

1.1. Related Works

As the key technology of network security, the user authentication protocol verifies the user’s legality and encrypts the transmission data between communication parties. It is crucial to ensure network security, and this is a prerequisite for ensuring the secure transmission of data and access by authorized users. In recent years, as sensor-based IoT technologies have been increasingly widely used in industrial and other scenarios, designing user authentication protocols for DWSNs has attracted the attention of the research community. In general, for DWSN user authentication protocols, in addition to being suitable for the actual needs and capable of user anonymity, mutual authentication, and high efficiency, they should also be able to defend against malicious attacks, like insider attacks, replay attacks, and physical impersonation attacks [10]. It is worth noting that the sensor node physical impersonation attack is easily overlooked.
Researchers have proposed various user authentication protocol schemes based on the hash function to address the challenges posed by the high-security requirements and resource constraints imposed by wireless sensors due to data sensitivity in the WSN environment [11,12,13,14,15,16,17,18,19,20,21]. Although these schemes are efficient in computation cost, they are still subject to some attacks, resulting in session key leakage or failure to meet the relevant security properties of the session key, which cannot guarantee the session key’s security negotiated by the two parties. For example, Das [22] proposed a three-factor (password, smartcard, biometrics) authentication protocol for a large-scale DWSN, but we found that Das’s scheme suffered from smartcard loss attack, failed to provide sensor node anonymity, and could not thwart a physical impersonation attack. Md. et al. [23] also found that Das’s scheme failed to resist a known session-specific temporary information attack and replay attack; the scheme [13] lacks forward secrecy; that is, if the system key is obtained by an attacker, the attacker can calculate the session key shared by the user and the sensor; protocols [12,14,15,19,20] are vulnerable to a temporary information leakage attack; protocols [11,16,17,18] cannot withstand a session key leakage attack; and protocols [15,19,20,21] could not thwart a physical impersonation attack. To address the security flaws of these authentication schemes by using the hash function, Wang et al. emphasized that public key operations should be employed to construct an authentication protocol in universal circumstances [24]. Compared with RSA and other public key cryptosystems, elliptic curve cryptography (ECC) has the merits of a shorter key length and faster computing speed, and it has been widely employed in various authentication protocols [25,26,27,28,29,30,31,32,33]. However, this kind of user authentication, using an ECC protocol for the WSN environment, still has the problem of high computation cost. Moreover, related research has shown that these authentication schemes based on ECC still lack anonymity and cannot resist security risks like a user impersonation attack and insider attack. Thus, designing a DWSN authentication protocol that not only can resist various known attacks and satisfy favorable security properties but also achieve a good trade-off between security and efficiency is a very challenging task.
Because public key cryptography with Chebyshev chaotic mapping has the merits of not relying on large prime numbers, faster computation, and shorter encryption length under the same security strength compared with modular exponential and ECC in public key cryptosystems, some researchers have proposed user authentication schemes using chaotic mapping [34,35]. Wang et al. [34] reported that a previous scheme lacked forward secrecy and was insecure to resist a session key leakage attack, impersonation attack, sensor node impersonation attack, desynchronization attack, and temporary information leakage attack; additionally, they suggested an improved anonymous authentication protocol to surmount these defects. However, our examination revealed that Wang et al.’s scheme fails to resist a gateway impersonation attack and temporary information leakage attack. To overcome the lack of forward secrecy, lack of three-factor (password, smartcard, biometric) security, and other defects in the previous scheme, Xu et al. [35] suggested a three-factor authentication protocol with chaotic mapping; however, the attacker can launch a replay attack because their scheme lacks a timestamp mechanism, and when insiders obtain registration information and the smartcard, they can recover some secret information and launch a user impersonation attack correspondingly. Li et al. [36] suggested an enhanced scheme with chaotic mapping to overcome the shortcomings in the previous scheme. Unfortunately, we point out that Li et al.’s solution is not appropriate in practice because, in their architecture, the user is capable of communicating directly with the sensor without having to go through a gateway, which shows that the communication distance is too far and that the signal transmission needs to consume more energy, resulting in the rapid depletion of the scanty energy of the sensor. Over the past few years, several enhanced authentication schemes [37,38,39] have been devised to eliminate the security weaknesses of previous protocols and to improve their efficiency using chaotic mapping in recent years. These schemes provide better security features compared to [10,27,28,29,30], but we note that none of them can defend against a sensor node physical impersonation attack.
Because sensors in the current DWSN are still at risk of being captured and physically impersonated by attackers, a new technique called PUF is being used in sensor nodes to improve the security of WSN authentication protocols. Recently, Shao et al. [40] put forward a mutual anonymous authentication protocol using PUF and a fuzzy extractor to thwart a desynchronization attack and privileged-insider attack for a wireless medical sensor network environment. In their scheme, both the user and the sensor use PUF to negotiate a session key to secure real-time data transmission between them. However, their scheme is not resistant to a desynchronization attack, and it is expensive to deploy because PUF is used on both the user and sensor sides. To resolve the faultiness of physical-layer security and over-centralized problem of the wireless medical sensor network, Wang et al. [41] devised a lightweight authentication protocol using PUF and blockchain technology with dynamic identity updates. Although this solution successfully addressed the physical-layer security of the sensor, all three participants in the authentication process needed to save many challenge response pairs in advance, which undoubtedly took up plenty of storage space for each of them. Lee et al. [42] presented a three-factor anonymous authentication scheme with PUF to ensure the secure communication of a wireless medical sensor network. It is possible for Lee et al.’s protocol to eliminate a sensor node capture attack within their protocol; however, the challenge response pairs saved in the gateway note are not updated during the authentication process, which exposes their scheme to potential risks such as an insider attack. In [43], a multifactor authentication scheme utilized PUF for an IoT-enabled WSN to provide a solution for accessing remote sensors through a base station. Recently, to address security shortcomings in three different schemes, Tyagi et al. [44] suggested an authentication scheme using PUF and ECC. However, we discovered that Tyagi et al.’s solution did not renew the challenge response pair as Lee et al.’s scheme [42], and the sensors directly communicate with the user as the scheme [36]. Although their scheme may protect against a sensor node physical impersonation attack, the high computation cost and communication cost or inner design flaws make them impractical in deployment.

1.2. Research Motivation and Contribution

Due to the huge application potential of a DWSN in many scenarios, some authentication protocols applied to the DWSN environment still have security defects, so it is extremely necessary to design authentication protocols with high security that are suitable for the DWSN environment. On the one hand, due to the scant energy and computation capability of wireless sensors, traditional network security technologies cannot be directly employed in a DWSN; thus, an authentication protocol for a DWSN should be designed to be efficient and lightweight. On the other hand, the data collected and transmitted by wireless sensors are frequently sensitive and can even lead to serious problems such as privacy disclosure and personal security, so there is a higher demand for security. In addition, compared to other public key cryptography systems such as ECC, Chebyshev chaotic mapping not only reduces computation cost on a wireless sensor with limited resources but also improves computation efficiency of the authentication scheme while maintaining higher security. In particular, sensor nodes are easily captured by attackers to launch a physical impersonation attack, so an authentication protocol must be able to defend against a physical impersonation attack. To solve these problems, we propose a DWSN anonymous authentication scheme using PUF and Chebyshev chaotic mapping.
The following are the contributions of this paper:
  • We put forward an anonymous user authentication scheme for a DWSN utilizing PUF, Chebyshev chaotic mapping, and two factors, i.e., password and smartcard. Our scheme uses PUF only on sensor nodes to thwart a physical impersonation attack, and there is no need to prepare many challenge response pairs in advance. The challenge-response information of the sensor node is also not fixed but varies during each authentication process to guarantee the sensor node’s physical security, and this does not require a special additional phase. In addition, we use the public key cryptography system Chebyshev chaotic mapping, which can not only prevent the guessing attacks caused by the simple use of the hash function to generate the shared session key but can also ensure the same security with only one-third of the operation cost compared with an ECC.
  • We demonstrate the security of our scheme by using the BAN logic and heuristic analysis to demonstrate that it not only achieves secure session key negotiation and mutual authentication but also has the ability of preventing various known attacks while possessing the desired security features.
  • We analyze the performance by comparing our protocol with that of state-of-the-art relevant protocols to indicate that our protocol produces a better trade-off between efficiency and security.

2. Preliminaries

2.1. Chebyshev Chaotic Mapping

Let p and t be variables, and pZ+, t ∈ [−1, 1]. The definition of p degree Chebyshev polynomial is as follows: Tp(t): [−1,1] → [−1, 1], Tp(t) = cos(parccos(t)) [45]. When p ≥ 2, the equivalent iterative relation is Tp (t) = 2 t Tp−1(t) − Tp−2(t), where T1(t) = t and T0(t) = 1. Chebyshev polynomial satisfies the following semigroup property: Tq(Tp(t)) = Tqp(t) = Tpq(t) = Tp(Tq(t)), where q and pZ+. When p > 1, the Chebyshev polynomial is also called the Chebyshev chaotic mapping.
For example, we set p = 0, 1, 2, …, and t = 0.3; thus, T0(t) = 1, T1(t) = 0.3, T2(t) = 2tT1(t) − T0(t) = −0.82, T3(t) = −0.792, T4(t) = 0.3448, T5(t) = 0.99888, T6(t) = 0.2545, and T6(t) = T3(T2(t)) = T2(T3(t)) = 0.2545. By repeating this process, a series of values can be obtained that satisfy the semigroup property, and as the number of iterations increases, the output will exhibit complex and unpredictable characteristics.
In 2008, Zhang [46] proved that the Chebyshev polynomial still satisfies the semigroup property if the variable t is extended to the interval (−∞, +∞). The extended Chebyshev polynomial is described as Tp (t) = 2tTp−1(t) − Tp−2(t) mod P, where P is a large prime and t ∈ (−∞, +∞). For convenience, mod P is left out in the subsequent subsections. The security of the extended Chebyshev polynomial is mainly based on the following two mathematical problems as follows:
Discrete Logarithm Problem (DLP): Given a, b = Tr(a), P, and a ∈ (−∞,+∞), find r in polynomial time such that bTr(a) is infeasible.
Diffie–Hellman Problem (DHP): Given a, Tr(a), Ts(a), P, and a ∈ (−∞,+∞), find b in polynomial time such that bTrs(a) is infeasible.

2.2. Physically Unclonable Function

A physically unclonable function (PUF) is a function that uses structured differences within a physical circuit so that any input challenge outputs a unique and unpredictable response [47]. A PUF’s output response is based on the intrinsic properties of the physical system, so each PUF is unique, unpredictable, and difficult to replicate or simulate. The PUF can also realize several traditional public key encryption functions while reducing the computation and communication overhead. The PUF is embedded as the basic unit in the computing device, which enhances the security of the protocol, and the computing time can be negligible. The PUF can be expressed as a functional relationship between the input challenge C and the output response R, i.e., R = PUF(C).

2.3. Adversary Model

To facilitate the reader’s comprehension of the cryptanalysis of our proposal in Section 4, an adversary model depicting the attacker’s capabilities is presented here according to the relevant literature.
  • The attacker can completely manipulate the public channel; that is, the attacker can intercept, block, tamper, and retransmit the message on the public channel [48,49].
  • The attacker can draw out the secret parameters on the smartcard [50].
  • To facilitate memory, the identity and password set by the user often have low entropy, so the attacker can conduct an offline guessing attack on the user’s identity and password simultaneously by enumeration [24,51,52].
  • The lengths of the random numbers and keys chosen by each communicating entity are large enough that an attacker cannot successfully guess them in polynomial time [53].
  • When considering an insider attack, insiders can derive the registration message sent by the user during the registration phase [54,55].

2.4. Security Requirements

In light of the literature [48,53], an efficient and robust DWSN user authentication protocol should meet the security requirements as follows.
  • Provide N-factor security: For an N-factor (password, smartcard, biometric information, etc.) authentication protocol for the DWSN, even if an attacker obtains N − 1 factors, the attack cannot log into the system.
  • Defense against known attacks: The DWSN authentication protocol should be robust enough to defend against known attacks like an impersonation attack, an insider attack, a temporary information leakage attack, and a replay attack.
  • Provide forward secrecy: If the master key of the system is leaked, an attacker should either be unable to recover the previous session keys or be unable to calculate future session keys.
  • Prevent a sensor node capture attack: If an attacker captures a sensor node, other sensor nodes are not affected.
  • User anonymity: The attacker cannot disclose the real identities of users.
  • Mutual authentication and key agreement: Mutual authentication between the sensor and the user is achieved, and a shared session key is negotiated.

3. Our Proposed Scheme

In this section, we suggest a two-factor (password, smartcard) authentication protocol for the DWSN. Our scheme improves security and efficiency mainly in three aspects:
  • We use PUF to thwart a physical impersonation attack and sensor node capture attack.
  • Because it is imperative that the public key algorithm is used to improve the security of the protocol [24], we adopt the Chebyshev chaotic mapping algorithm, which is superior to other public key algorithms in terms of efficiency, to improve efficiency and provide forward secrecy.
  • We utilize a fuzzy verifier mechanism to eliminate an offline guessing attack caused by the loss/stolen smartcard being acquired by attackers.
Our solution consists of five phases: system setup, user registration, sensor node registration, login and authentication, and password update.
The meanings of the symbols used in this article are listed in Table 1.

3.1. System Setup

The ith gateway node GWi selects the master key KGi, a large prime number αi, a Chebyshev polynomial parameter βi ∈ (−∞,+∞), calculates GP = TKGi(βi), and stores {KGi, αi} secretly and publishes {GP, βi}.

3.2. User Registration

  • Ui sets the identity IDi and password PWi and then delivers a registration request message {IDi} to the GWi via a secure channel.
  • On receiving the message, GWi checks whether IDi is in the database. If IDi already exists, GWi aborts the registration. Otherwise, it stores IDi in the database and selects random numbers x and Rg, calculates DIDi = h(IDi||Rg), UIDi = DIDih(x||KGi), Pi = h(UIDi||KGi), stores {Pi, x} into the database, and stores {UIDi, DIDi, h(), βi} into the smartcard. Finally, GWi delivers the card to Ui through a secure channel.
  • After receiving the smartcard, the user chooses a random number r and calculates Ai = h(PWi||r), selects δ ∈ [28, 210], calculates Ri = rh(IDi||PWi) mod δ, Hi = DIDih(PWi||IDi||r), Li = UIDih(IDi||Ai), Vi = h(Ai||IDi), replaces {UIDi, DIDi} with {Hi, Li} in the smartcard, and keeps (Ri, Vi, δ) in the smartcard.

3.3. Sensor Node Registration

  • Sj chooses the identity SIDj and a random number Rj, calculates PRj = h(SIDj||Rj), and sends the registration request information {SIDj, PRj} to the GWi.
  • After receiving {SIDj, PRj}, GWi calculates KSj = h(PRj||KGi), Pj = h(SIDj||KGi), stores {Pj, PRj} in the database, and then transmits {KSj, Cs} to Sj via a secure channel, where Cs is a challenge.
  • On receiving {KSj, Cs}, Sj computes Rs = PUF(Cs), sends to GWi, and stores {PRj, KSj} in memory.
  • GWi stores {Cs, Rs} in the database.

3.4. Login and Authentication

  • Ui inserts the smartcard, inputs IDi and PWi, calculates r* = Rih(IDi||PWi) mod δ, Ai* = h(PWi||r*), Vi* = h(Ai*|| IDi), and verifies that Vi* == Vi holds. If not, Ui terminates this session. Otherwise, Ui selects random number a and timestamp T1, computes A1 = Ta(βi), DIDi = Hih(PWi||IDi||r*), UIDi = Lih(IDi||Ai*), V1 = h(DIDi ||UIDi||A1||T1), M1 = (UIDi||SIDj||V1)⊕Ta(GP), and transmits a login request {A1,M1, T1} to GWi.
  • On receiving the user’s login request, GWi uses the current timestamp T1 to verify |T1T1| ≤ ΔT, decrypts M1 by computing M1TKGi(A1) to obtain UIDi, SIDj, V1, calculates Pi = h(UIDi ||KGi), Pj = h(SIDj||KGi), retrieves the secret value x according to Pi, retrieves {Cs, Rs, PRj} according to Pj, calculates KSj = h(PRj||KGi), DIDi = UIDih(x||KGi), V1 = h(DIDi||UIDi||A1||T1), and verifies whether V1 == V1 holds. If the stipulation is false, GWi aborts the session; otherwise, GWi chooses random number b and timestamp T2, M2 = (h(b||DIDi)||Cs)⊕h(KSj||SIDj), V2 = h(SIDj||h(b||DIDi)||A1||Rs||T2), and finally delivers {M2, A1, V2, T2} to Sj.
  • On receiving the incoming message, Sj verifies |T2T2| ≤ ΔT with the current timestamp T2’ and calculates (h(b||DIDi)’||Cs’) = M2h(KSj||SIDj), Rs = PUF(Cs), V2 = h(SIDj||h(b||DIDi)’||A1||Rs||T2), and verifies whether V2 == V2 holds. If not, Sj ends the session; otherwise, Sj selects random number c and timestamp T3, computes Csnew = h(Cs||h(b||DIDi)), Rsnew = PUF(Csnew), A2 = Tc(y), session key SKsu = h(h(b||DIDi)||A1||A2||Tc(A1)), V3 = h(Rsnew||KSj||h(b||DIDi)||A2||T3), Lj = RsnewKSj, M3 = h(A1||A2||SKsu), and finally sends the message {A2, Lj, V3, M3, T3} to GWi.
  • On receiving the message, GWi verifies that |T3T3| ≤ ΔT, where T3 is the current timestamp, calculates Rsnew = LjKSj, V3 = h(Rsnew ||KSj||h(b||DIDi)||A2||T3), and determines whether V3 and V3 are equal. If not, GWi ends the session. Otherwise, GWi obtains the current timestamp T4, and calculates Csnew = h(Cs||h(b||DIDi)), M4 = h(b||DIDi)⊕h(DIDi||UIDi||T4), V4 = h(M3||DIDi||T4), replaces {Pj, Cs, Rs, PRj} with {Pj, Csnew, Rsnew, PRj}, and finally sends {A2, M4, V4, T4} to Ui.
  • Upon receiving the message from GWi, Ui uses the current timestamp T4 to verify |T4T4| ≤ ΔT, calculates h(b||DIDi)″= M4h(DIDi||UIDi||T4), SKus = h(h(b||DIDi)||A1||A2||Ta(A2)), V4 = h(h(A1||A2||SKus)||DIDi||T4), and compares V4’ and V4 for equality. If V4 and V4 are equal, Ui accepts SKus as the session key with Sj; otherwise, Ui terminates the session.
This phase is illustrated in Figure 2.

3.5. Password Update

If the user intends to renew the password, the subsequent steps are necessary.
  • Ui inserts the smartcard into the card reader and types his IDi and password PWi. The smartcard calculates r = Rih(IDi||PWi) mod δ, Ai = h(PWi||r), DIDi = Hih(PWi||IDi||r), UIDi = Lih(IDi||A*), Vi = h(Ai||IDi), and compares Vi and Vi for equality. If the two are equal, the smartcard executes the next step; otherwise, the card ends this session.
  • Ui inputs his IDi and new password PWinew, calculates Ainew = h(PWinew||r), Rinew = rh(IDi||PWinew) mod δ, Hinew = DIDih(PWinew||IDi||r), Linew = UIDih(IDi||Ainew), and Vinew = h(Ainew||IDi).
  • Ui replaces {Hi, Li, Ri, Vi} with {Hinew, Linew, Rinew, Vinew} on the card.

4. Security Analysis

In this section, we first employ BAN (Burrows_Abadi_Needham) logic [48] to demonstrate the security of the proposal, and then, we perform a heuristic analysis to show that the proposal can thwart known attacks and satisfies the security requirements of DWSNs.

4.1. Security Proof

BAN logic is a belief-based modal logic that has been widely used in the formal analysis of key agreement security of cryptographic authentication protocols. We employ the BAN logic to prove the security property of mutual authentication and key agreement in the proposal. To save space, we use the BAN symbols and rules in [48] to perform the security proof of the proposal.
We define the following goals of our protocol:
Goal 1: Ui|≡Sj|≡(Ui  S K  Sj)
Goal 2: Ui|≡(Ui  S K  Sj)
Goal 3: Sj|≡Ui|≡(Ui  S K  Sj)
Goal 4: Sj|≡(Ui  S K  Sj)
The idealized form of the messages transmitted by each communication participant during the authentication process is described as below:
Msg1: UiGWi: <A1, M1, T1>DIDi
Msg2: GWiSj: <h(b||DIDi), A1, V2, T2>KSj
Msg3: SjGWi: <A2, Lj, V3, M3, T3>KSj
Msg4: GWiUi: <A2, h(b||DIDi), V5, T4>UIDi
According to the initial state of the proposal, we make the following assumptions:
  • H1: Ui|≡#(T4)
  • H2: GWi|≡#(T1)
  • H3: Sj|≡#(T2)
  • H4: GWi|≡#(T3)
  • H5: GWi|≡GWi  D I D i  Ui
  • H6: Sj|≡GWi  K S j  Sj
  • H7: GW|≡GWi  K S j  Sj
  • H8: Ui|≡Sj|≡Ui  S K  Sj
  • H9: Ui|≡Ui  U I D i  GWi
  • H10: Sj|≡Ui|≡Ui  S K  Sj
The validity of the proposal on the basis of the above definition and the BAN logic rules is carried out as follows.
From Msg1, we obtain S1:
GWi◁<A1, M1, T1>DIDi
Thus, according to S1, H5, and the message meaning rule, we obtain S2:
GWi|≡Ui|~<UIDi, DIDi, A1, T1>
According to S2, H2, and the freshness-conjuncatenation rule, we obtain S3:
GWi|≡#<UIDi, DIDi, A1, T1>
According to S2, S3, and the brief rule, we obtain S4:
GWi|≡Ui|≡<UIDi, DIDi, A1, T1>
From Msg2, we obtain S5:
Sj◁<h(b||DIDi), A1, V2, T2>KSj
According to S5, H6, and the message meaning rule, we obtain S6:
Sj|≡GWi|~<h(b||DIDi), A1, V2, T2>
According to S6, H3, and the freshness-conjuncatenation rule, we obtain S7:
Sj|≡#<h(b||DIDi), A1, V2, T2>
According to S6, S7, and the brief rule, we obtain S8:
Sj|≡GWi |≡<h(b||DIDi), A1, V2, T2>
From Msg3, we obtain S9:
GWi◁<A2, Lj, V3, M3, T3>KSj
According to S9, H7, and the message meaning rule, we obtain S10:
GWi|≡Sj|~<A2, Lj, V3, M3, T3>
According to S10, H4, and the freshness-conjuncatenation rule, we obtain S11:
GWi|≡#<A2, Lj, V3, M3, T3>
According to S10, S11, and the brief rule, we obtain S12:
GWi|≡Sj|≡<A2, Lj, V3, M3, T3>
From Msg4, we obtain S13:
Ui◁<A2, h(b||DIDi), V5, T4>UIDi
According to S13, H9, and the message meaning rule, we obtain S14:
Ui|≡GWi|~<A2, h(b||DIDi), V5, T4>
According to S14, H1, and the freshness-conjuncatenation rule, we obtain S15:
Ui|≡#<A2, h(b||DIDi), V5, T4>
According to S14, S15, and the brief rule, we obtain S16:
Ui|≡GWi|≡<h(b||DIDi), A1, V2, T2>
Because SK = h(h(b||DIDi)||A1||A2||Ta1(A2)), and according to S12 and S16, we obtain S17:
U i | S j | ( U i S K S j )   ( Goal   1 )
According to S17, H8, and the Jurisdiction rule, we obtain S18:
U i | ( U i S K S j )   ( Goal   2 )
According to S4 and S8 and because SK = h(h(b||DIDi)||A1||A2||Ta1(A2)), we obtain S19:
S j | U i | ( U i S K S j )   ( Goal   3 )
Finally, according to S19, H10, and the Jurisdiction rule, we obtain S20:
S j | ( U i S K S j )   ( Goal   4 )
Therefore, Goals 1–4 have been proven successfully, and it means that, in the proposal, Ui and Sj not only authenticate mutually but also generate a session key between them.

4.2. Security Analysis

We analyze the security of our scheme and finally compare it with related protocols with regard to security properties.
  • Smartcard loss attack: Assume that the attacker derives the smartcard of the legitimate user and retrieves the secret data {Hi, Li, Ri, Vi, h(), δ, βi} on the card through the side channel analysis technique [50], where Hi = DIDih(PWi||IDi||r), Li = UIDih(IDi||Ai), Vi = h(Ai||IDi), and Ai = h(PWi||r), Ri = rh(IDi||PWi) mod δ. If the attacker intends to guess IDi and PWi through Hi and Li because the attacker knows nothing about the secret parameter r of the user Ui and the secret parameters (x, Rg) and the master key KGi of the GWi, the attack will not succeed. In addition, if the attacker intends to guess IDi and PWi through Vi, first, r must be found by calc unnecessary ulating r = Rih(IDi||PWi) mod δ. However, due to the protection of the fuzzy verifier technique, the probability of the attacker’s guessing success is very trivial and can be ignored [24]. Therefore, our scheme can defend against a smartcard loss attack.
  • N-factor security: Our protocol is a two-factor (password, smartcard) scheme; thus, N = 2. On the one hand, if the attacker only acquires the password, clearly, the attacker cannot log in to the system. On the other hand, if the attacker only obtains the smartcard, although the attacker can extract the secret parameters on the smartcard, as analyzed in item 1 of Section 4.2, the attacker still cannot guess the user’s password and cannot log into the system. Thus, our scheme can provide N-factor security.
  • Insider attack: Suppose the insider obtains the user’s registration request {IDi}, temporarily derives the user’s smartcard, retrieves the secret parameters {Hi, Li, Ri, Vi, h(), δ, βi} on the card through a side channel analysis attack, and then prepares to guess the user’s password PWi through the parameters (Hi, Li, Ri, Vi), as analyzed in item 1 of Section 4.2, due to the protection of the fuzzy verifier mechanism, the attacker will fail to acquire r so that the correct PWi cannot be guessed, and finally, the two important parameters (DIDi, UIDi) of the user cannot be disclosed. In addition, we suppose an insider has obtained the sensor information {Pj, Cs, Rs, PRj} stored in GWi and eavesdrops on the interaction messages {M2, A1, V2, T2} and {A2, Lj, V3, M3, T3} between GWi and the sensor. Although the attacker can obtain the updated PUF response by computing Rsnew = LjRs, because the calculation of the session key involves parameters A1 and A2 and the attacker cannot break the DLP and DHP problems, the attacker cannot calculate the session key based on h(h(b||DIDi)||A1||A2||Tc(A1)).
Therefore, our protocol can protect against an insider attack.
4.
Forward secrecy and backward secrecy: In our protocol, if an attacker acquires Ui’s smartcard, the attacker cannot launch a successful guessing attack on IDi and PWi, so our protocol does not suffer from the forward secrecy issue as in Kwon et al.’s scheme. On the other hand, even if the master key KGi of the GWi is disclosed to the attacker, because the session key SK= h(h(b||DIDi)||A1||A2||Tc(A1)) and the attacker cannot obtain PRj, the attacker is incapable of calculating KSj; as a result, h(b||DIDi) cannot be obtained by calculating M2h(KSj||SIDj). More importantly, although the attacker can eavesdrop on the messages containing A1 and A2 in the public channel, the attacker still cannot calculate SK because calculating Tc(A1) is equivalent to solving the DLP problem and the DHP problem. In summary, our scheme can provide forward and backward secrecy for session keys.
5.
Mutual authentication: In some schemes, like Kwon et al.’s protocol [15], the mutual authentication among Ui, GWi, and Sj relies on the single secret parameter HIDi. Once the attacker acquires the parameter HIDi, the attacker can impersonate a legal user to deliver a valid login request to GWi and pass the authentication of GWi and Sj and, finally, generate a shared session key with Sj. In our scheme, the authentication of GWi to Ui depends on these secret parameters (αi, Pi, x, KGi); the mutual authentication of GWi and Sj depends on the two parameters of KSj and SIDj, and SIDj transmitted on the open channel is not in clear text; the authentication of Ui to GWi relies on two secret parameters of UIDi and DIDi. It can be observed that the mutual authentication among communication entities in our scheme does not depend on a single parameter but on multiple sets of mutually independent secret parameters. This makes it extremely difficult for attackers to spoof messages to deceive communication entities and pass their verification. Thus, our scheme achieves mutual authentication among the three communication participants Ui, GWi, and Sj.
6.
Desynchronization attack: Since our scheme does not need to synchronously update the related information between GWi and the user’s smartcard in each authentication process to keep user anonymity and to prevent the attacker from tracing, our scheme can defend against a desynchronization attack.
7.
Replay attack: In our scheme, the messages sent by Ui, GWi, and Sj all contain timestamps, and the timestamps are protected using a hash function in Vi (i = 1, 2, 3, 4). Upon receiving the message, the receiver must not only check the freshness of the timestamps but must also check the corresponding hash value Vi. If the attacker intends to conduct a replay attack by intercepting the message and changing the timestamp and retransmitting the message to the receiver, it will cause the Vi calculated by the hash function at the receiver’s side using the timestamp as a parameter to be inconsistent with the received Vi, and the session will be ended. Thus, our scheme can prevent a replay attack.
8.
Sensor node capture Attack: If the attacker captures the sensor node Sj, the attacker can read the key KSj from the sensor’s memory and restore h(b||DIDi) of the three parameters needed to reveal the session key based on the eavesdropped messages {M2, A1, V2, T2} and {A2, Lj, V3, M3, T3}. Because the session key SK = h(h(b||DIDi)″||A1||A2||Ta(A2)), the attacker is still unable to reveal the session key as the attacker also faces both the DLP problem and the DHP problem. In addition, due to the features of PUF, the attacker cannot produce Rs or Rsnew from Cs or Csnew, which is necessary to generate the valid authenticators V2 and V3, respectively. In this way, even if the sensor Sj is captured by an attacker, it will not affect the secure communication between other sensor nodes and Ui. Thus, our protocol can defend against a sensor node capture attack.
9.
Man-in-the-middle attack: Assuming the attacker blocks the user’s login request message {A1, M1, T1}, because he does not obtain {KGi, αi}, he or she cannot decrypt M1 to obtain relevant information (UIDi, SIDj, V1). In addition, if the attacker obtains {KGi, αi} by some means, but because V1 = h(DIDi||UIDi||A1||T1) and the attacker cannot obtain x, it is not feasible to fake V1. Hence, our proposal can thwart a man-in-the-middle attack.
10.
User anonymity: Suppose the attacker eavesdrops on four messages, {A1, M1, T1}, {M2, A1, V2, T2}, {A2, Lj, V3, M3, T3}, and {A2, M4, V4, T4}, in the login and authentication phase, since M1 is ciphertext, other parameters are generated using random numbers (a, b, c), timestamps, and hash functions, and the message in each user login process is different. In addition, there is no user identity information that allows for the attacker to track the user according to these messages, and the attacker also cannot determine whether different login request messages are delivered by the same user. Thus, the proposal achieves user anonymity.
11.
User Impersonation Attack: In the proposal, if the attacker is going to conduct a user impersonation attack to deceive GWi, the attacker must first produce a valid login request message {A1, M1, T1}. However, without knowledge of the user’s IDi, PWi, and parameters (DIDi, UIDi), the attacker cannot produce a valid login request message. In addition, it has been pointed out in item 1 of Section 4.2 that, even if the user’s smartcard is stolen by the attacker, the guessing attack on IDi and PWi will not be successful. It is also pointed out in item 2 of Section 4.2 that, even if the user’s IDi and smartcard are obtained by the attacker and the attacker starts guessing the password, he or she will fail due to the protection of the fuzzy verifier technique. Hence, the proposal can thwart a user impersonation attack.
12.
Physical impersonation attack: This attack indicates that an attacker can imitate the sensor to send a fake message {A2, Lj, V3, M3, T3} to GWi and pass the validation of GWi. However, if the attacker intends to recreate the same wireless sensor as the original wireless sensor with the PUF, the fake message {A2, Lj, V3, M3, T3} generated by the attacker through the invalid PUF will be discriminated and rejected by the GWi. Hence, the proposed scheme can defend against a physical impersonation attack.
13.
DoS attack: In our scheme, an attacker might send a previously valid message {A1, M1, T1} to GWi repeatedly to consume the target’s resources. If the attacker alters T1 to T1’ so that TctT1’ ≤ Δt is valid, where Tct is the current time and Δt represents a very small time interval, although GWi passes the verification of timestamp T1’, GWi also calculates V1’ = h(DIDi||UIDi||A1||T1’) according to T1 and then determines whether V1’ = V1 is valid. Obviously, since V1 = h(DIDi ||UIDi||A1||T1), V1’ = h(DIDi||UIDi||A1||T1’), and T1’ ≠ T1 and the attacker does not know DIDi and UIDi, the attacker cannot forge V1 to pass authentication. So V1’ = V1 does not hold, and GWi terminates the session. Similarly, if an attacker repeatedly sends messages {M2, A1, V2, T2}, {A2, Lj, V3, M3, T3}, and {A2, M4, V4, T4} to the sensor, gateway, and user to launch a DoS (Denial of Service) attack, it will also be unsuccessful. The analysis process is similar to the above. Therefore, our scheme can prevent a DoS attack.
14.
Comparison of security features: According to the above security analysis, we compare the proposal with state-of-the-art schemes [28,29,33,40,42,43,44] with respect to security features, and the result is as exhibited in Table 2, where “√” means that the attack can be thwarted or the security property can be satisfied, while “x” means that the attack cannot be resisted or the security property cannot be satisfied. It can be observed from Table 2 that the scheme [44] cannot prevent a physical impersonation attack, though it uses the PUF function on the user side. Although the scheme [40] uses the PUF function on both the user side and sensor side, it is not resistant to a desynchronization attack. Furthermore, compared with other related schemes, our scheme can defend against more attacks and satisfy more security properties, while other schemes are subject to some security flaws, more or less.
When considering the influence of the external environment on the proposal, various states can be constructed, such as the user sends an authentication request, the gateway verifies the authenticity of the user’s identity, the sensor verifies the authenticity of the gateway and the user, the gateway verifies the authenticity of the sensor’s identity, the user verifies the authenticity of the gateway’s identity, and then the Markov chain is established. If the external environment changes, such as an increase in network latency or an attacker attempts brute-force intercepted messages, the timestamp mechanism resolves these issues. Although this may affect the probability of transition, the future state depends only on the current state, not on past states and historical information, so the execution process of the proposal conforms to the Markovian effect and does not conform to the non-Markovian effect [56]. These are left for a future in-depth analysis.

5. Performance Analysis

In this section, we compare the performance of the proposal with state-of-the-art schemes [28,29,33,40,42,43,44] with respect to the login and authentication phase in four aspects: computation overhead, communication overhead, sensor throughput, and storage overhead.

5.1. Computation Overhead

For convenience, we use the running time of various cryptographic operations in the literature [34,35] as the benchmark to calculate the computation overhead of each scheme. Suppose that TH, TP, TC, TF, and TS denote the execution times of a hash function, an elliptic curve point multiplication, a Chebyshev polynomial calculation, a Rep function of the fuzzy extractor, and the symmetric encryption/decryption, respectively, and their values are 0.5 ms, 63.08 ms, 21.02 ms, 63.08 ms, and8.7 ms, respectively. Since the XOR operation takes very little time, we ignore its time overhead. Table 2 shows the comparison results between the proposal and relevant protocols in terms of computation overhead. For ease of understanding, we show Table 3 as a graph in Figure 3.

5.2. Communication Overhead

According to [34], we set the length of the random number, elliptic curve, hash value, Chebyshev polynomial, identity, timestamp, and encrypted block lengths to 128 bits, 320 bits, 160 bits, 128 bits, 32 bits, 32 bits, and 128 bits, respectively. Table 3 shows the comparison results of communication overhead between the proposal and relevant schemes [28,29,33,40,42,43,44]. Moreover, for the sake of understanding, we present Table 4 as a graph, as shown in Figure 4.

5.3. Sensor Throughput

Because wireless sensors are often deployed in unattended environments, it is difficult for users to replenish their energy in real time. A wireless sensor consumes a certain amount of energy to receive and send data, so its network throughput is closely related to its life cycle. Therefore, we analyze the network throughput to examine its impact on the life cycle of the sensor node. The comparison results of the sensor node throughput between the proposed scheme and the other schemes [28,29,33,40,42,43,44] are shown in Table 5 and Figure 5.

5.4. Storage Overhead

By comparing the proposal with state-of-the-art protocols [28,29,33,40,42,43,44] in terms of their own storage overhead for the three communication participants Ui, GWi, and Sj, the results are illustrated in Table 6 and Figure 6.

5.5. Comprehensive Analysis

From the performance comparison of the four aspects mentioned above, we can see that our scheme has favorable performance. From Table 3 and Figure 3, we can see that the proposal requires the least computation time of 139.62 ms. Compared with that of the other schemes, the computation overhead of our protocol has a significant advantage over that of the other schemes [28,29,33,40,42,43,44]. Furthermore, from Figure 4 and Figure 5, we can see that our protocol and Saini et al.’s scheme [33] have the lowest communication overhead among all the protocols, our protocol is slightly higher than protocols [33,42] in terms of sensor throughput, and Figure 6 also shows that our protocol is slightly higher than protocols [28,29,33,42] but better than protocols [40,43,44] in terms of storage overhead. Although schemes [40,44] use PUF to ensure the security of authentication, it can be seen from Figure 3 to Figure 6 that they have no advantage in terms of computation overhead, communication overhead, sensor node throughput, and storage overhead compared with our scheme, and the computation cost of [42] is three times that of our scheme. Moreover, the computation overhead and communication overhead of [43] are almost 2.5 times greater than those of our scheme, and their storage overhead is 2 times greater than that of our scheme. In addition, as can be seen from Table 2, scheme [40] fails to avoid a smartcard loss attack and user impersonation attack. Both scheme [42] and scheme [43] cannot provide user anonymity and sensor node anonymity, which makes it difficult for them to protect user privacy and the sensor does face some potential attacks; thus, these schemes cannot fully meet the security requirements of a DWSN. In summary, our scheme is more efficient than most of the related schemes while satisfying comprehensive security requirements. Compared with other related protocols, our protocol can achieve a better trade-off between performance and security, so it is more suitable for deployment in the WSN application environment.

6. Conclusions

In this study, we suggest an anonymous authentication scheme with PUF and Chebyshev chaotic mapping for a DWSN to resist some security defects, especially the easily overlooked physical impersonation attack, and we use BAN logic to prove the security of the protocol. In addition, our protocol is compared with related protocols in five aspects, security features, computation overhead, communication overhead, sensor throughput, and storage overhead. The results show that, although our protocol is not the most efficient compared with the competitive schemes, it can fulfill the security requirements that are needed for DWSN circumstances. Consequently, our protocol is more suitable for actual deployment than the related schemes. The countermeasure we took to eliminate the security defects is suitable for addressing the security weaknesses in similar authentication protocols, and this countermeasure can also be used as a reference for designing new protocols in the future.
In future work, we plan to use a more advanced public key algorithm to reduce the runtime of the public key operation and to improve the performance of this protocol. In addition, we will build an environment suitable for conducting DWSN experiments, such as connecting dedicated wireless sensors to actual hardware, such as Arduino or Raspberry Pi, for testing or using simulation software NS-3 3.40 to simulate network behavior, simulate various attack scenarios (such as node capture attack, replay attacks, etc.), verify the security of the protocol, and measure indicators such as computation overhead, communication overhead, and energy consumption for performance evaluation.

Author Contributions

Conceptualization, J.M.; methodology, J.M. and Z.Z.; software, Z.Z.; validation, Z.Z. and Y.L.; formal analysis, J.M. and Y.L.; writing—original draft preparation, J.M.; writing—review and editing, Z.Z.; supervision, Y.L. and J.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available in this article.

Acknowledgments

The authors would like to thank the anonymous reviewers for their constructive comments and recommendations.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Sadeghi Ghahroudi, M.; Shahrabi, A.; Ghoreyshi, S.M.; Alfouzan, F.A. Distributed node deployment algorithms in mobile wireless sensor networks: Survey and challenges. ACM Trans. Sens. Netw. 2023, 19, 1–26. [Google Scholar] [CrossRef]
  2. Talmale, R.; Bhat, M.N. Energy attentive and pre-fault recognize mechanism for distributed wireless sensor network using fuzzy logic approach. Wirel. Pers. Commun. 2022, 124, 1263–1280. [Google Scholar] [CrossRef]
  3. Peter, O.; Pradhan, A.; Mbohwa, C. Industrial internet of things (IIoT): Opportunities, challenges, and requirements in manufacturing businesses in emerging economies. Procedia Comput. Sci. 2023, 217, 856–865. [Google Scholar] [CrossRef]
  4. Anitha, R.; Tapas Bapu, B. Blockchain-based light-weight authentication approach for a multiple wireless sensor network. IETE J. Res. 2024, 70, 1480–1494. [Google Scholar] [CrossRef]
  5. Magara, T.; Zhou, Y. Internet of Things (IoT) of Smart Homes: Privacy and Security. J. Electr. Comput. Eng. 2024, 2024, 7716956. [Google Scholar] [CrossRef]
  6. Huo, Y.; Xu, Y.; Zhao, X.; Sun, Y.; Li, S. Path Loss Estimation of Wireless Sensor Networks in Coal Mine Collapsed Zone. IEEE Sens. J. 2024, 24, 9002–9015. [Google Scholar] [CrossRef]
  7. Alimoradi, P.; Barati, A.; Barati, H. A hierarchical key management and authentication method for wireless sensor networks. Int. J. Commun. Syst. 2022, 35, e5076. [Google Scholar] [CrossRef]
  8. Wang, C.; Wang, D.; Duan, Y.; Tao, X. Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things. IEEE Trans. Inf. Foren. Sec. 2023, 18, 2961–2976. [Google Scholar] [CrossRef]
  9. Reziouk, A.; Laurent, E.; Demay, J.-C. Practical security overview of IEEE 802.15. 4. In Proceedings of the 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, Morocco, 22–24 September 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–9. [Google Scholar]
  10. Li, X.; Liu, S.; Kumari, S.; Chen, C.-M. PSAP-WSN: A provably secure authentication protocol for 5g-based wireless sensor networks. CMES-Comput. Model. Eng. Sci. 2023, 135, 711. [Google Scholar] [CrossRef]
  11. Huang, W. ECC-based three-factor authentication and key agreement scheme for wireless sensor networks. Sci. Rep. 2024, 14, 1787. [Google Scholar] [CrossRef]
  12. Yu, S.J.; Park, Y.H. SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks. Sensors 2020, 20, 4143. [Google Scholar] [CrossRef]
  13. Wu, F.; Li, X.; Xu, L.; Vijayakumar, P.; Kumar, N. A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion. IEEE Syst. J. 2020, 15, 1120–1129. [Google Scholar] [CrossRef]
  14. Darbandeh, F.G.; Safkhani, M. SAPWSN: A secure authentication protocol for wireless sensor networks. Comput. Netw. 2023, 220, 109469. [Google Scholar] [CrossRef]
  15. Kwon, D.K.; Yu, S.J.; Lee, J.Y.; Son, S.H.; Park, Y.H. WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks. Sensors 2021, 21, 936. [Google Scholar] [CrossRef]
  16. Wu, T.-Y.; Yang, L.; Lee, Z.; Chu, S.-C.; Kumari, S.; Kumar, S. A provably secure three-factor Authentication protocol for wireless sensor networks. Wirel. Commun. Mob. Com. 2021, 2021, 5537018. [Google Scholar] [CrossRef]
  17. Kumar, D. A secure and efficient user authentication protocol for wireless sensor network. Multimed. Tools Appl. 2021, 80, 27131–27154. [Google Scholar] [CrossRef]
  18. Goyat, R.; Kumar, G.; Saha, R.; Conti, M. Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. Clust. Comput. 2024, 27, 4823–4839. [Google Scholar] [CrossRef]
  19. Nyangaresi, V.O.; Yenurkar, G.K. Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks. High-Confid. Comput. 2024, 4, 100178. [Google Scholar] [CrossRef]
  20. Thakur, G.; Prajapat, S.; Kumar, P.; Chen, C.-M. A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks. J. Syst. Archit. 2024, 154, 103245. [Google Scholar] [CrossRef]
  21. Mostefa, B.; Abdelkader, G.; Mohamed, B. User-Authentication Protocol to Secure Wireless Sensor Network Access in the Internet of Things Context. J. Commun. Softw. Syst. 2024, 20, 186–197. [Google Scholar] [CrossRef]
  22. Das, A.K. A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wirel. Pers. Commun. 2015, 82, 1377–1404. [Google Scholar] [CrossRef]
  23. Shafiullah, S.M.; Reddy, M.C.M.; Gorripati, R.; Bapana, S.; Naresh, M.; Vorugunti, C.S. A secure and light weight three factor authentication protocol for Large Scale Distributed wireless sensor networks. In Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1944–1949. [Google Scholar]
  24. Wang, D.; Wang, P. Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans. Depend. Secure 2016, 15, 708–722. [Google Scholar] [CrossRef]
  25. Abdi Nasib Far, H.; Bayat, M.; Kumar Das, A.; Fotouhi, M.; Pournaghi, S.M.; Doostari, M.-A. LAPTAS: Lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wirel. Netw. 2021, 27, 1389–1412. [Google Scholar] [CrossRef]
  26. Wang, C.; Xu, G.; Li, W. A secure and anonymous two-factor authentication protocol in multiserver environment. Secur. Commun. Netw. 2018, 2018, 9062675. [Google Scholar] [CrossRef]
  27. Fan, Q.; Chen, J.; Xu, F.; Li, L.; Luo, M. A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 2022, 34, e6178. [Google Scholar] [CrossRef]
  28. Hu, B.; Tang, W.; Xie, Q. A two-factor security authentication scheme for wireless sensor networks in IoT environments. Neurocomputing 2022, 500, 741–749. [Google Scholar] [CrossRef]
  29. Ding, Z.; Xie, Q. Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things. Sustainability 2023, 15, 5734. [Google Scholar] [CrossRef]
  30. Ghahramani, M.; Javidan, R. Time dependency: An efficient biometric-based authentication for secure communication in wireless healthcare sensor networks. J. Comput. Virol. Hacki. 2023, 19, 303–317. [Google Scholar] [CrossRef]
  31. Thakur, G.; Prajapat, S.; Kumar, P.; Das, A.K.; Shetty, S. An efficient lightweight provably secure authentication protocol for patient monitoring using wireless medical sensor networks. IEEE Access 2023, 11, 114662–114679. [Google Scholar] [CrossRef]
  32. Xie, Q.; Xie, Q. Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System. IEEE Internet Things 2024, 11, 15038–15042. [Google Scholar] [CrossRef]
  33. Saini, K.K.; Kaur, D.; Kumar, D.; Kumar, B. An efficient three-factor authentication protocol for wireless healthcare sensor networks. Multimed. Tools Appl. 2024, 83, 63699–63721. [Google Scholar] [CrossRef]
  34. Wang, F.; Xu, G.; Xu, G. A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map. IEEE Access 2019, 7, 101596–101608. [Google Scholar] [CrossRef]
  35. Xu, G.; Wang, F.; Zhang, M.; Peng, J. Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks. IEEE Access 2020, 8, 47282–47294. [Google Scholar] [CrossRef]
  36. Li, J.; Zhang, W.; Kumari, S.; Choo, K.K.R.; Hogrefe, D. Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans. Emerg. Telecommun. Technol. 2018, 29, e3295. [Google Scholar] [CrossRef]
  37. Mo, J.; Hu, Z.; Shen, W. A provably secure three-factor authentication protocol based on chebyshev chaotic mapping for wireless sensor network. IEEE Access 2022, 10, 12137–12152. [Google Scholar] [CrossRef]
  38. Tyagi, G.; Kumar, R. An improved multifactor user authentication scheme for wireless sensor networks. Wirel. Pers. Commun. 2022, 123, 1311–1343. [Google Scholar] [CrossRef]
  39. Tyagi, G.; Kumar, R. Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem. Peer Peer Netw. 2023, 16, 260–276. [Google Scholar] [CrossRef]
  40. Shao, X.; Guo, Y.; Guo, Y. A PUF-based anonymous authentication protocol for wireless medical sensor networks. Wirel. Netw. 2022, 28, 3753–3770. [Google Scholar] [CrossRef]
  41. Wang, W.; Chen, Q.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things 2021, 9, 8883–8891. [Google Scholar] [CrossRef]
  42. Lee, J.; Oh, J.; Park, Y. A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks. Electronics 2023, 12, 1368. [Google Scholar] [CrossRef]
  43. Kumar, R.; Singh, S.; Singh, P.K. A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs. Comput. Electr. Eng. 2023, 105, 108495. [Google Scholar] [CrossRef]
  44. Tyagi, G.; Kumar, R. An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function. Int. J. Inf. Secur. 2024, 23, 935–962. [Google Scholar] [CrossRef]
  45. Mason, J.C.; Handscomb, D.C. Chebyshev Polynomials; CRC Press: Boca Raton, FL, USA, 2002. [Google Scholar]
  46. Zhang, L. Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Soliton Fract. 2008, 37, 669–674. [Google Scholar] [CrossRef]
  47. Herder, C.; Yu, M.-D.; Koushanfar, F.; Devadas, S. Physical unclonable functions and applications: A tutorial. Proc. IEEE 2014, 102, 1126–1141. [Google Scholar] [CrossRef]
  48. Wang, C.; Xu, G.; Jing, S. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks. Sensors 2017, 17, 2946. [Google Scholar] [CrossRef]
  49. Amin, R.; Islam, S.H.; Biswas, G.P.; Khan, M.K.; Leng, L.; Kumar, N. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 2016, 101, 42–62. [Google Scholar] [CrossRef]
  50. Kim, T.H.; Kim, C.; Park, I. Side channel analysis attacks using AM demodulation on commercial smart cards with SEED. J. Syst. Software 2012, 85, 2899–2908. [Google Scholar] [CrossRef]
  51. Mangard, S.; Oswald, E.; Popp, T. Power Analysis Attacks: Revealing the Secrets of Smart Cards; Springer Science & Business Media: New York, NY, USA, 2008; Volume 31, Available online: https://link.springer.com/book/10.1007/978-0-387-38162-6 (accessed on 21 September 2024).
  52. Li, W.; Shen, Y.; Wang, P. Breaking Three Remote user Authentication Systems for Mobile Devices. J. Signal Process. Syst. 2018, 90, 1179–1190. [Google Scholar] [CrossRef]
  53. Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar] [CrossRef]
  54. Mo, J.; Chen, H. A lightweight secure user authentication and key agreement protocol for wireless sensor networks. Secur. Commun. Netw. 2019, 2019, 2136506. [Google Scholar] [CrossRef]
  55. Choi, Y.; Lee, Y.; Moon, J.; Won, D. Security enhanced multi-factor biometric authentication scheme using bio-hash function. PLoS ONE 2017, 12, e0176250. [Google Scholar] [CrossRef]
  56. Gardiner, C.W.; Zoller, P. Quantum Noise: A Handbook of Markovian and Non-Markovian Quantum Stochastic Methods with Applications to Quantum Optics; Springer: Berlin/Heidelberg, Germany, 2004. [Google Scholar]
Figure 1. The typical architecture of a DWSN.
Figure 1. The typical architecture of a DWSN.
Electronics 14 00010 g001
Figure 2. The login and authentication phase.
Figure 2. The login and authentication phase.
Electronics 14 00010 g002
Figure 3. Comparison of computation overhead [28,29,33,40,42,43,44].
Figure 3. Comparison of computation overhead [28,29,33,40,42,43,44].
Electronics 14 00010 g003
Figure 4. Comparison of communication overhead [28,29,33,40,42,43,44].
Figure 4. Comparison of communication overhead [28,29,33,40,42,43,44].
Electronics 14 00010 g004
Figure 5. Comparison of sensor node throughput [28,29,33,40,42,43,44].
Figure 5. Comparison of sensor node throughput [28,29,33,40,42,43,44].
Electronics 14 00010 g005
Figure 6. Comparison of storage overhead [28,29,33,40,42,43,44].
Figure 6. Comparison of storage overhead [28,29,33,40,42,43,44].
Electronics 14 00010 g006
Table 1. The meaning of notations.
Table 1. The meaning of notations.
NotationMeaning
GWiThe ith gateway node
Uiith user
Sjjth sensor node
IDiUi’s identity
PWiUi’s password
SIDjSj’s identity
KGiGWi’s master key
KjSj’s secret password key
h()A secure one-way hash function
TiTimestamp, i = 1, 2, ….
||Concatenation
Bitwise XOR operation
The public channel
Table 2. Comparison of security features.
Table 2. Comparison of security features.
Security Features[28][29][33][40][42][43][44]Ours
S1××
S2××
S3
S4××××
S5×××
S6
S7×
S8×
S9×
S10××
S11××
S12××××
S13
S14××
S1: Resist smartcard loss attack; S2: Resist user impersonation attack; S3: Resist GW impersonation attack; S4: Resist sensor node capture attack; S5: Resist desynchronization attack; S6: Provide forward secrecy; S7: Resist replay attack; S8: Resist insider attack; S9: Resist man-in-the-middle attack; S10: User anonymity; S11: Sensor node anonymity; S12: Resist physical impersonation attack; S13: Mutual authentication and key agreement; S14: Resist DoS attack.
Table 3. Comparison of computation overhead.
Table 3. Comparison of computation overhead.
[28][29][33][40][42][43][44]Ours
Ui7TH + 3TP6TH + TF + 2TP + 2TS13TH + TF + 2TP13TH + TF18TH + TF9TH12TH +TF + 2TP9TH + 3TC
GWi9TH + TP3TH + 6TS10TH + 2TP17TH + TF22TH15TH + 2TS + 3TF8TH12TH + TC
Sj8TH + 2TP2TH + 2TP + 2TS6TH8TH + TF12TH + TF9TH + TF + TS6TH + 2TP6TH + 2TC
Total cost24TH + 6TP11TH + TF + 4TP + 10TS29TH + TF + 4TP38TH + 3TF52TH + 2TF33TH + 4TF + 3TS26TH + TF + 4TP27TH + 6TC
Computation overhead (ms)390.48407.9329.9208.24467.56286.22328.4139.62
Table 4. Comparison of communication overhead.
Table 4. Comparison of communication overhead.
[28][29][33][40][42][43][44]Ours
Communication overhead (bits)32523456195227522016512026561952
Table 5. Comparison of sensor node throughput.
Table 5. Comparison of sensor node throughput.
[28][29][33][40][42][43][44]Ours
Receive92864038489651210241152480
Send852896352512192864960480
Total (bits)17801536736140870418882112960
Table 6. Comparison of storage overhead.
Table 6. Comparison of storage overhead.
[28][29][33][40][42][43][44]Ours
Smartcard54473696083264024641728746
Gateway640608832131289620164481204
Sensor192192352320512192480320
Total13761536214424642048467226562270
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mo, J.; Zhang, Z.; Lin, Y. A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF. Electronics 2025, 14, 10. https://doi.org/10.3390/electronics14010010

AMA Style

Mo J, Zhang Z, Lin Y. A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF. Electronics. 2025; 14(1):10. https://doi.org/10.3390/electronics14010010

Chicago/Turabian Style

Mo, Jiaqing, Zhihua Zhang, and Yuhua Lin. 2025. "A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF" Electronics 14, no. 1: 10. https://doi.org/10.3390/electronics14010010

APA Style

Mo, J., Zhang, Z., & Lin, Y. (2025). A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF. Electronics, 14(1), 10. https://doi.org/10.3390/electronics14010010

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop