4.6 Article

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks

Journal

IEEE ACCESS
Volume 5, Issue -, Pages 3376-3392

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2017.2673239

Keywords

Authentication; biometrics; key management; privacy; Rabin cryptosystem; smart card; wireless sensor networks

Ask authors/readers for more resources

Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration, it also brings new threats, such as the exposure of sensor nodes to attacks originating from the Internet. In this context, lightweight authentication and key agreement protocols must be in place to enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual authentication protocol for WSNs. However, we identified several flaws in their protocol. We found that their protocol suffers from smart card loss attack where the user identity and password can be guessed using offline brute force techniques. Moreover, the protocol suffers from known session-specific temporary information attack, which leads to the disclosure of session keys in other sessions. Furthermore, the protocol is vulnerable to tracking attack and fails to fulfill user untraceability. To address these deficiencies, we present a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry. We conduct a formal verification of our proposed protocol using ProVerif in order to demonstrate that our scheme fulfills the required security properties. We also present a comprehensive heuristic security analysis to show that our protocol is secure against all the possible attacks and provides the desired security features. The results we obtained show that our new protocol is a secure and lightweight solution for authentication and key agreement for Internet integrated WSNs.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks

Qing Fan, Debiao He, Jianhua Chen, Cong Peng, Lianhai Wang

Summary: Driven by cloud computing technologies, public-key encryption with keyword search (PEKS) is becoming popular in various fields. However, there are security and privacy issues in the encrypted data search and access processes. This article presents a postquantum searchable encryption scheme named Isoga, which fights against keyword guessing attacks. The scheme utilizes designated tester primitive and quantum resistance of isogeny.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Information Systems

On the Niho Type Locally-APN Power Functions and Their Boomerang Spectrum

Xi Xie, Sihem Mesnager, Nian Li, Debiao He, Xiangyong Zeng

Summary: This article discusses the locally-APN power functions introduced by Blondeau, Canteaut, and Charpin, which generalize APN functions and are potentially more resistant to differential attacks. The study focuses on the Niho type power function F(x) = xs(2m- 1)+1 over the finite field F22m, where s is the multiplicative inverse modulo 2m + 1. The authors prove the locally-APN property of F(x) and determine its differential spectrum through detailed analysis of equation solutions in finite fields. The article highlights that computer experiments confirm the coverage of all Niho type locally-APN power functions for 2 <= m <= 10. Additionally, the boomerang spectrum of F(x) is determined by using its differential spectrum.

IEEE TRANSACTIONS ON INFORMATION THEORY (2023)

Article Computer Science, Information Systems

A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things

Xin Chen, Debiao He, Muhammad Khurram Khan, Min Luo, Cong Peng

Summary: The Internet of Medical Things (IoMT), which combines medical sensors with the Internet of Things, enables remote diagnosis and real-time decision making. However, it raises security challenges due to the sensitive patient information involved. This article presents a new certificateless signcryption (CLSC) scheme for data privacy in IoMT, utilizing the Schnorr signature for improved security and performance.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Telecommunications

BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs

Biwen Chen, Zhongming Wang, Tao Xiang, Jiyun Yang, Debiao He, Kim-Kwang Raymond Choo

Summary: Vehicular Ad-Hoc Networks (VANETs) have improved driving safety and comfort through vehicular wireless communication technology. However, existing authentication protocols in VANETs have limitations in terms of privacy protection, malicious entity tracking, and cross-domain authentication. To address these challenges, we propose a secure and effective group signature scheme for anonymous authentication and traceable identity within a domain, and a blockchain-based privacy-preserving cross-domain authentication protocol (BCGS) that integrates both blockchain and group signature. Our evaluations show that BCGS outperforms other approaches in terms of security, computation, and storage costs.

VEHICULAR COMMUNICATIONS (2023)

Article Engineering, Multidisciplinary

Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain

Jie Cui, Nan Liu, Qingyang Zhang, Debiao He, Chengjie Gu, Hong Zhong

Summary: The rapid development of the Industrial Internet of Things (IIoT) has improved industrial manufacturing efficiency through intelligent devices and collaboration. However, cross-domain communication in IIoT faces security and privacy issues. To address these issues, we propose an efficient and anonymous cross-domain authentication scheme based on blockchain, which improves authentication efficiency, ensures device anonymity, and combines blockchain and dynamic accumulator technology for fast authentication.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Hardware & Architecture

EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things

Qi Feng, Debiao He, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo

Summary: In this paper, we propose an Efficient and Privacy-preserving Real-time Incentive system for CrowdsEnsing (EPRICE), designed to estimate the reliability of sensing data in a privacy-preserving setting. The theoretical analysis demonstrates that our proposed system achieves a high level of privacy-preserving for real-time reward distribution and supports practical privacy-preserving properties. The experimental findings show that our proposed EPRICE system significantly decreases the computation costs by three orders of magnitude compared with other competing schemes.

IEEE TRANSACTIONS ON COMPUTERS (2023)

Article Computer Science, Theory & Methods

Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach

Jie Cui, Hu Sun, Hong Zhong, Jing Zhang, Lu Wei, Irina Bolodurina, Debiao He

Summary: With the development of communication technology and intelligent transportation systems, vehicular ad hoc networks (VANETs) have gained popularity, leading to increased importance of VANET communication security. An intrusion detection system (IDS) is essential in improving network security, but faces challenges in accuracy, efficiency, and completeness due to frequent location changes in VANETs. This study proposes a collaborative intrusion detection system (CIDS) model that utilizes federated learning in software-defined VANETs to address these issues. The model trains through collaboration among local software-defined networks (SDNs) without sharing local network data flows, improving IDS scalability and globality.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

MCPAP: A MSIS-based conditional privacy-preserving authentication protocol for smart grids

Quanrun Li, Debiao He, Haifeng Liu, Xiaoying Jia, Zhichao Yang

Summary: This paper presents a security-enhanced conditional privacy-preserving authentication protocol to address the vulnerability of existing protocols in the smart grid to attacks from quantum computers. The protocol is shown to have superior security in the random oracle model, and its potential utility and efficiency improvement are demonstrated through performance analysis.

JOURNAL OF SYSTEMS ARCHITECTURE (2023)

Article Computer Science, Information Systems

User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things

Lang Pu, Chao Lin, Biwen Chen, Debiao He

Summary: The Industrial Internet of Things (IIoT) utilizes physical devices to collect data, which needs to be saved on a cloud server for processing and analysis. Traditional encryption techniques make it difficult to search the generated ciphertext. Public-key encryption with keyword search (PEKS) can provide data encryption and confidential searching, but it is susceptible to internal keyword guessing attacks (IKGAs) due to limited commonly used keywords. A user-friendly public-key authenticated encryption with keyword search (PAEKS) scheme is proposed in this article to address this issue.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Blockchain-Assisted Secure Data Sharing Protocol With a Dynamic Multiuser Keyword Search in IIoT

Ningbin Yang, Chunming Tang, Debiao He

Summary: The Industrial Internet of Things (IIoT) and cloud computing have seen rapid development, leading to enterprises outsourcing industrial data via the cloud to lower costs and improve efficiency. However, concerns over data security and privacy in cloud outsourcing systems exist. To address these issues, this study proposes a blockchain-assisted secure data-sharing protocol with dynamic multiuser keyword search (DMUKS) in IIoT. The protocol utilizes blockchain techniques to solve the single-key exposure problem and allows for fast certificateless keyword search, dynamic user and key management.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Theory & Methods

BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records

Biwen Chen, Tao Xiang, Debiao He, Hongwei Li, Kim-Kwang Raymond Choo

Summary: In this paper, we propose BPVSE, a new verifiable and dynamic searchable encryption scheme for cloud-assisted EHR. BPVSE leverages blockchain and hash-proof chain to enable public verification of search results without a trusted authority. It supports dynamic datasets with forward and backward security, using a newly designed hidden data structure. Additionally, BPVSE allows for efficient encryption and parallel search.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Environmental

Remarkable adsorption capacity of Cu2+-doped ZnAl layered double hydroxides and the calcined materials toward phosphate

Ding Ling Gao, Wei Wei Lin, Qiao Jing Lin, Fei Fei Dai, Yan Xue Xue, Jian Hua Chen, Yu Xiang Liu, Yang Huang, Qian Yang

Summary: In this study, Cu2+ was doped into ZnAl hydrotalcite to enhance its phosphate adsorption capacity. The Cu2+ doping increased the inter-layer spacing and specific surface area of the adsorbent. The optimal doping amount was found to be 1% of the total metal molarity. The resulting ZnAlCu layered trimetallic oxide exhibited significantly improved phosphate adsorption performance compared to ZnAl hydrotalcite and ZnAlCu ternary hydrotalcite.

JOURNAL OF ENVIRONMENTAL CHEMICAL ENGINEERING (2023)

Article Computer Science, Theory & Methods

PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership

Yang Liu, Debiao He, Qi Feng, Min Luo, Kim-Kwang Raymond Choo

Summary: The anonymous credential has various applications, such as pay-as-you-go strategy in electronic subscription. However, the strategy may not suit non-regular users as they require stricter identity supervision. Identity supervision is a crucial part of an anonymous credential system and needs to be both reasonable and practical in regulating user behavior. The combination of customized k-times and epochs is necessary due to the limitations of existing works. This paper presents a permissioned redactable credentials scheme that allows fine-grained supervision, user control, and user redaction, providing potential utility when evaluated for performance.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

Exploring Dynamic Task Loading in SGX-Based Distributed Computing

Pengfei Wu, Jianting Ning, Wu Luo, Xinyi Huang, Debiao He

Summary: This article introduces a T-SGX framework based on trusted execution environments, which aims to protect user privacy and ensure system efficiency by dynamically loading enclave objects. All these objects are secretly shared and stored in a verifiably distributed share management system to mitigate exposure of sensitive information. Security analysis shows that T-SGX achieves secure distributed computing without privacy leakage to unauthorized parties. Experimental results demonstrate that T-SGX outperforms a state-of-the-art solution, with 11.9%-29.7% less overhead in SGX-based applications.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Hardware & Architecture

An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks

Xinjie Zhu, Debiao He, Zijian Bao, Min Luo, Cong Peng

Summary: Online social networks (OSNs) are becoming increasingly popular as the demand for online interaction grows. However, current OSNs using centralized identity management systems face issues of single point of failure and privacy data leakage. This paper presents a decentralized identity (DID) protocol to address these challenges, including a range proof protocol for attribute privacy and an extended identity model for identity revocation. The proposed protocol is implemented on the blockchain and analysis shows it provides stronger privacy protection with acceptable computation cost and blockchain overheads.

IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY (2023)

No Data Available