Page 1

Scientific Journal of Impact Factor (SJIF): 5.71

e-ISSN (O): 2348-4470 p-ISSN (P): 2348-6406

International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018

A Privacy-Preserving User Authentication Scheme for WirelessSensor Network Users G. Bhargavi#1, Maddali M. V. M. Kumar#2 #1

#2

PG Student, Dept. of MCA, St. Ann’s College of Engineering & Technology, Chirala. Assistant Professor, Dept. of MCA, St. Ann’s College of Engineering & Technology, Chirala.

Abstract- seamless roaming over wireless network is very attractive to portable clients, and security, for example, verification of mobile clients is testing. As of late, because of alter protection and comfort in dealing with a secret word record, some shrewd card based secure confirmation plans have been proposed. This paper demonstrates some security shortcomings in those plans. As the fundamental commitment of this paper, a protected and light-weight verification plot with client secrecy is introduced. It is easy to execute for mobile client since it just plays out a symmetric encryption/decoding operation. Having this component, it is more appropriate for the low-power and asset restricted cell phones. Likewise, it requires four message trades between mobile client, outside specialist and home operator. Therefore, this convention appreciates both calculation and correspondence proficiency when contrasted with the outstanding confirmation plans. As an uncommon case, we consider the confirmation convention when a client is situated in his/her home system. In this paper, we propose a privacy-preserving all inclusive authentication protocol, called priauth, which gives solid client obscurity against the two busybodies and remote servers, session key foundation, and accomplishes productivity. In particular, priauth gives an effective way to deal with handle the issue of client renouncement while supporting solid client untraceability. Index terms: authentication, mobile user, broad cast, wireless network. 1. Introduction A privacy-preserving user authentication plan ought to fulfil the accompanying necessities: (1) server authentication: a client is certain about the character of the remote server. (2) subscription validation: an outside server is certain about the personality of a client's home server. (3) provision of user revocation mechanism: because of a few reasons (e.g., the membership time of a client has lapsed or a client's secret key has been traded off), client verification ought to enable an outside server to see if a meandering client is renounced. (4) key foundation: the client and the remote server set up an irregular session key which is known just to them and is gotten from commitments of them two. Specifically, the home server ought not to know the session key. (5) user anonymity: other than the client and its home server, nobody including the outside server can tell the personality of the client. (6) user intractability: other than the client and its home server, nobody including the outside server can interface any past or future convention keeps running of a similar client. At the point when client disavowal is upheld in a authentication protocol, it is all the more difficult to accomplish client untraceability on the grounds that on one hand, information is given to outside servers to distinguish repudiated clients, yet then again, the information ought not empower remote servers to connect other convention keeps running of the renounced client. All the more particularly, the convention runs required by a renounced client before his denial ought to stay unknown and unlinkable. This is alluded to as in reverse unlinkability in wandering administration. Likewise, for a period constrained denial due to, for instance, suspension of administration for a timeframe, the secrecy and the unlinkability of the disavowed client's convention pursues the repudiation time frame ought to likewise be kept up. We allude to this property as forward unlinkability in meandering administration. Prerequisite (6) incorporates in reverse and forward unlinkabilities which, up to this point, are unsolved issues. In this paper, we expect that the attacker has added up to control over all correspondence channels among the client, remote server and home server. That is, the attacker may catch, embed, erase, or adjust any message in the channels. Especially, we think about four noteworthy kinds of dangers to client verification, to be specific, message in transit risk, false mobile client danger, dos attack and store case attack. The message on the way danger incorporates that an attacker transfers or potentially diverts messages. The false mobile client risk incorporates the situation where an assailant could imitate an outside/home server, and also the situation where portable clients under the control of an attacker connive. Dos attack alludes to the mindboggling administration demands from attackers in the reason for blocking administrations from authentic mobile clients. In store case attack, the client is straightforward while there is neither a noxious server m, who will make the remote server v to trust that the home server of the client is m without being distinguished by the client nor its home server. @IJAERD-2018, All rights Reserved

344


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 02, February-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 In this paper, we address the issue of validation in wsns, especially confirmed communicate/multicast by sensor nodes and outside client confirmation. The issue of confirmed communicate/multicast by sensor nodes isn't tended to by the current validation plans for wsns. Symmetric plans like mtesla and its varieties proposed for base station communicate verification utilize message authentication code (mac) and are proficient as far as handling and vitality utilization. However, they suffer from the following issues:  Give deferred confirmation.  Not mobile as far as number of senders.  Multiple senders can't communicate all the while.  Very moderate for vast scale sensor systems.  Dos attack against capacity because recently validation. If a sensor node needs to communicate a message, it unicasts the message to the base station, which at that point communicates that message in the interest of that node. This paper makes two principle commitments: (1) we demonstrate some security shortcomings of current client validation conventions in remote interchanges. (2) we propose a protection safeguarding widespread confirmation convention called priauth. By introducing verifier-local revocation group signature with backward unlinkability(vlr-gs-bu), it can fulfill all necessities portrayed previously. Likewise, priauth just requires the wandering client and the outside server to be engaged with every convention run, and the home server can be disconnected. Furthermore, priauth has a place with the class of universal authentication protocols in which same convention and flagging streams are utilized paying little heed to the area (home or remote) a meandering client is going to. This helps diminishing the framework unpredictability practically speaking. Moreover, priauth underpins verifier-neighbourhood repudiation, which implies that verifiers (i.e., outside servers) can, in light of the revocation list (rl) sent from the home server, check locally whether a wandering client is denied. Note that vlrgsbu isn't initially intended for confirmation reason and an immediate utilization of it forces two issues in priauth. Right off the bat, it doesn't enable priauth to help new gathering part joining after framework setup. Furthermore, it doesn't give priauth the single enlistment property ordinarily accessible in most existing authentication protocols, which requires a client just to enrol once at the home system before having the capacity to get to the worldwide system. We will give answers for these two issues to make priauth common sense. 2. Authentications inwsn Validation in wsn can be partitioned into three classifications, in particular base station to sensor nodes, sensor nodes to other sensor nodes, and outside clients to sensor nodes. The issue of confirmed communicate by the base station has been broadly tended to. We concentrate on the other two classes, i.e., confirmed communicate/multicast by the sensor nodes and outside client confirmation. A. Authenticated broadcast/multicast by sensor nodes there is numerous basic circumstances where a sensor node needs to send a brisk message. For instance: in a woodland fire caution application, sensor nodes conveyed in a timberland ought to instantly educate specialists about the occasion and the correct area of the occasion before the fire spreads wildly. In a rush hour gridlock application, at whatever point a sensor node detects a mishap (or an automobile overload) out and about it sends a prompt message every which way to caution other activity moving toward this area. Consider the military application situation talked about where a troop of fighters needs to travel through a front line. Sensor nodes sent there distinguish the nearness of the foe and communicate this information quickly all through the system. Officers, going close to these sensor nodes, utilize this information to deliberately position themselves in the front line. Every one of these situations requires a message to be sent as fast as could reasonably be expected. Because of remote media, transmission and gathering of a message expend impressive time. Additionally, much of the time a message proliferates through a few bounces to achieve the coveted goals. In this manner, the mark age time and the check time ought to be as little as could be allowed. A deferred message may have unfortunate impacts. For instance, it might bring about flame spreading wildly and a congested driving conditions winding up more awful. A deferred message with respect to the nearness of an adversary in the combat zone may cause the passing of warriors while traveling through the front line. In all the above circumstances, message confirmation is required generally a malevolent element may abuse its nonattendance. For instance, a foe may send counterfeit messages to piece activity towards a particular locale or to turn movement towards a particular bearing. In front line, sensor nodes conveyed by the foe can spread wrong information about foe's development, accordingly deluding fighters. In addition, in all the previously mentioned situations, sensor nodes on the way from the sender node to the receiver(s) hand-off the messages towards goal. Remote correspondence enabling a foe to infuse false messages amid multi jump sending makes sensor nodes hand-off false information and exhaust their vitality. Thus, sensor nodes on the way ought to have the capacity to confirm and sift through false messages as right on time as conceivable to spare handing-off vitality. In this way, they are additionally potential collectors of these messages, emerging the need of validated multicast by sensor nodes. In war zone application, all sensor nodes in the system are potential recipients of basic information, emerging the need of confirmed communicate by sensor nodes. To compress, every one of these situations require a safe system which, on one hand, empowers all sensor nodes in the system to send a prompt validated message to report a basic circumstance, and then again, empowers each beneficiary to check this message.

@IJAERD-2018, All rights Reserved

345


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 02, February-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 B. Client authentication sensor nodes information might be private and in a few circumstances just the bought in clients, who have paid, are permitted to get this information. A client verification component plans to avoid unapproved clients to get to information from sensor nodes. Typically, an instrument to give an outside client access to sensor nodes information requires three assignments: 1) user authentication permits just genuine clients of the information to get to it. 2) access control enables a client to get to just the information which he is qualified for get to. 3) session key establishment empowers secure trade of client questions and secret information amongst clients and sensor nodes. In incorporated client verification, all clients are confirmed through the base station. This component is anything but difficult to convey in light of the fact that the base station is a capable device which can perform complex cryptographic operations. Be that as it may, this approach has a couple of downsides. Right off the bat, it makes the base station a solitary purpose of disappointment. Also, it causes sensor nodes close to the base station to drain their vitality rapidly with respect to each client ask for; they hand-off bundles between base station and questioned sensor nodes. Besides, it causes a serious dos attack where an enemy sends counterfeit demand messages making sensor nodes hand-off them towards the base station for check, expanding system activity and draining their vitality. Client verification plans talked about all experience the ill effects of these issues. To stay away from this sort of dos attack, a client ought to be privately validated by the sensor nodes without the contribution of a third element, i.e., a dispersed approach. This approach diminishes activity blockage and transmission overhead inside the system. In any case, it puts the weight of confirmation on sensor nodes. As sensor nodes are asset obliged devices when contrasted with the base station, a lightweight client verification component is required for sensor nodes to check realness of the clients. 3. Session key establishment To give secure transmission of information from sensor nodes to client, a session key should be built up. For this reason, any protected key trade convention could be utilized here. Be that as it may, a personality based one-pass key foundation convention is an alluring decision for asset compelled sensor nodes. It diminishes the quantity of messages traded amid key foundation stage i.e., just a single gathering figures and sends its fleeting key to the next gathering, for instance, personality based one-pass key foundation convention introduced. That solitary message can be joined with client ask for message (in client verification stage) which is marked by the client. It additionally decreases the correspondence. It likewise maintains a strategic distance from the man in the-center attack. The main message traded between the client u and the sensor node a for key foundation will be marked by u and confirmed by a, which makes it troublesome for an interloper to send counterfeit fleeting key to the sensor nodes for the benefit of u. To set up a session key, u arbitrarily processes its ephemeral key r. U at that point sends r, together with his mark, to an in verification stage. On the off chance that u's mark is legitimate and client verification succeeds, both an and u register session key sk utilizing the key inference work c as sk = c(idajjidujjtsjjtau), where ts is the time stamp to maintain a strategic distance from replayed messages and tau is a typical secret processed by the two gatherings utilizing r and their secret keys. Now, the session key sk is prepared for encrypting information. Client revocation:user disavowal can be partitioned into two cases; initially, to deny a client whose entrance day and age has been lapsed, and also, to repudiate a pernicious client. These two cases can be dealt with in an unexpected way. To deal with the primary case, when base station figures the secret key for a client u, the expiry time et of the client can be utilized as a parameter to ascertain the secret key. After his entrance day and age lapses, his secret key will consequently terminate. On the off chance that he now sends a marked demand, it won't pass check. In the second case, the base station issues a confirmed repudiation list containing vindictive client's id. Sensor nodes store it until the point that the malignant client's expiry time is passed. Subsequently, if next time that client endeavour’s to get to information from sensor nodes, the sensor nodes dismiss his demand without experiencing validation process. After his entrance time termination, his secret key will lapse and he won't have the capacity to effectively verify himself to the framework. In wsn, the instance of the vindictive clients isn't extremely normal. Accordingly, putting away ids of malevolent clients until the point when their expiry time won't force an absurd stockpiling overhead on sensor nodes. To proficiently deal with capacity, client's entrance period can be kept short so sensor nodes don't store vindictive clients' ids for quite a while. After that day and age just the private keys of the genuine clients are refreshed for next era. The length of this period relies upon how much of the time the occasion of the noxious clients happens. Albeit a few figures would enhance the coherence of system, space restriction does not permit it. 4. Additionally research scope So far the proposed confirmation plans depend on either cryptography or physical layer information. A combination of these two natives is alluring to secure the developing remote systems. For instance, in very powerful systems, for example, mobile specially appointed systems, vehicular impromptu systems, or postpone tolerant systems, it is difficult to keep up a focal expert to effectively disseminate and deal with the key. Consequently, clients with no pre-built up contact need to introduce a common secret or partner to each other on-the-fly. Conventional cryptography based diffie-hellman key trade strategy can fill for this need. Nonetheless, it is liable to man-in-the-center attack. Keeping in mind the end goal to keep the man in-the-center attack, two gatherings for the most part depend on a common secret. In this manner, it brings the predicament that diffie@IJAERD-2018, All rights Reserved

346


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 02, February-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 hellman is utilized to create a mutual key between two gatherings, however so as to keep the man-in-the-center attack, we require a pre-shared secret between the two gatherings. A conceivable and promising answer for this issue can be a crosslayer security outline. By abusing the one of kind properties of the remote channel, the two gatherings can some way or another recognizes or verifies the message traded in the diffie-hellman convention without depending on a preshared key. For instance, alice knows it is bob sending the diffie-hellman key trade messages to her when she watches a flag trademark related with these messages, and this trademark must be instigated at a specific area where bob is at.

Fig. 1.cross layer security schemes For interruption or noxious conduct recognition, it is additionally attractive to inspect numerous layer information to enhance the likelihood of identification. The reliance and relationship between's various layer practices or perceptions can be utilized to recognize vindictive/childish nodes. An illustrative case of a cross layer signature plot for verification and additionally bad conduct location is given in fig. 1. Physical layer csi/rss/radiometric information and rising advancements, for example, mimo (multiple-input and multiple output can be joined with the mac layer succession number/outline interim/portability example and transport layer tcp time stamp/movement design/port number to create a solid verification plan to validate a node. For rowdiness location, arrange layer source address and goal address can be utilized alongside the vehicle layer movement designs. 5. Conclusions The fundamental contribution of this examination work is to propose an authentication system which gives two highlights; brisk verified communicate by sensor nodes and client verification. Existing communicate confirmation conspires in wsn don't deal with the issue of verified communicate by sensor nodes. The proposed id-based online/offline signature (iboos) based communicate validation conspire is an alluring answer for this issue. An id-based signature (ibs) based disseminated client verification plot is additionally proposed to confirm outside clients. Session keys secure the further correspondence amongst clients and sensor nodes. The principle favorable position of this system is its re-ease of use, that is, it can likewise be reused with new ibs and iboos plans for security and execution upgrades. Later on, we plan to concentrate on client get to control to give a total id-based validation structure which would empower the sensor nodes, on one hand, to communicate a message to rapidly react to some basic circumstances and, then again, to control client access as per his entrance benefits. We are headed to execute the proposed system on genuine sensor nodes to get real outcomes. In this paper, we have proposed a novel convention to accomplish protection safeguarding general validation for remote correspondences. The security examination and trial comes about demonstrate that the proposed approach is attainable for genuine applications.

@IJAERD-2018, All rights Reserved

347


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 02, February-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 References [1] J.-L. Tsai, “Efficient Multi-Server Authentication Scheme Based On One Way Hash Function Without Verification Table,” Computers &Security, Vol. 27, No. 3-4, Pp. 115-121, 2008. [2] H.-C. Hsiang AndW.-K. Shih, “Improvement Of The Secure Dynamic ID Based Remote User Authentication Scheme For Multi-Server Environment,” Computer Standards &Interfaces, Vol. 31, No. 6, Pp. 1118-1123, 2009. [3] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, AndE. Cayirci, “Wireless Sensor Networks: A Survey,” Computer Networks, Vol. 38, Pp. 393–422, 2002. [4] M. Bellare, C. Namprempre, AndG. Neven, “Security Proofs For Identity-Based Identification And Signature Schemes,” In Proc. EUROCRYPT ’04. Springer-Verlag, 2004, Pp. 268–286. [5] Z. Benenson, “Realizing Robust User Authentication In Sensor Networks,” In Proc. REALWSN ’05, 2005. [6] Z. Benenson, F. Gartner, AndD. Kesdogan, “User Authentication In Sensor Networks (Extended Abstract),” In Proc. Informatik2004, Workshop On Sensor Networks, 2004. [7] G. Ravi Teja and Maddali M.V.M. Kumar, “Secure Data Aggregation Technique in the Existence of Conspiracy Attacks using WSN”,International Journal of Research in Applied Science and Engineering Technology. Vol. 4, no. 3, pp. 792797, 2016. [8] J. Bohli, A. Hessler, O. Ugus, AndD. Westhoff, “A Secure And Resilient WSN Roadside Architecture For Intelligent Transport Systems,” In Proc. Wisec ’08. NY, USA: ACM, 2008, Pp. 161–171. [9] D. He, M. Ma, Y. Zhang, C. Chen, And J. Bu, “A Strong User Authentication Scheme With Smart Cards For Wireless Communications,” Computer Commun., 2010, Doi:10.1016/J.Comcom.2010.02.031. [10] G. Yang, Q. Huang, D. S. Wong, And X. Deng, “Universal Authentication Protocols For Anonymous Wireless Communications,” IEEE Trans. Wireless Commun., Vol. 9, No. 1, Pp. 168-174, 2010. [11] G. Yang, D. S. Wong, And X. Deng, “Anonymous And Authenticated Key Exchange For Roaming Networks,” IEEE Trans. Wireless Commun., Vol. 6, No. 9, Pp. 3461-3472, 2007. [12] G. Yang, D. Wong, And X. Deng, “Deposit-Case Attack Against Secure Roaming,” In Proc. ACISP’05, 2005. [13] D. He And S. Chan, “Design And Validation Of An Efficient Authentication Scheme With Anonymity For Roaming Service In Global Mobility Networks,” Wireless Personal Commun., 2010, Doi:10.1007/S11277-010- 0033-5 [14] P. Naga Babuand Maddali M.V.M. Kumar, “The Notion of Partial Network Level Cooperation for Energy Harvesting Networks,” International Journal of Scientific Engineering and Technology Research. Vol. 6, No. 10, Pp. 2060-2064, 2017. [15] M. Zhang And Y. Fang, “Security Analysis And Enhancements Of 3GPP Authentication And Key Agreement Protocol,” IEEE Trans. Wireless Commun., Vol. 4, No. 2, Pp. 734-742, 2005. [16] C. C. Lee, M. S. Hwang, And I. E. Liao, “Security Enhancement On A New Authentication Scheme With Anonymity For Wireless Environments,” IEEE Trans. Consumer Electron., Vol. 53, No. 5, Pp. 1683-1687, 2006. [17] C. C. Wu, W. B. Lee, And W. J. Tsaur, “A Secure Authentication Scheme With Anonymity For Wireless Communications,” IEEE Commun. Lett., Vol. 12, No. 10, Pp. 722-723, 2008. ABOUT AUTHORS:

G.Bhargavi is currently pursuing her MCA in MCA Department, St.Ann's College Engineering and Technology,Chirala A.P. She received her Bachelor of Science from ANU.

Mr. Maddali M. V. M. Kumar received his Master of Technology in Computer Science & Engineering from JNTUK and currently pursuing his Ph.D. in Computer Science & Engineering from ANU. He is working as an Assistant Professor in the Department of MCA, St. Ann’s College of Engineering & Technology. He is a Life Member in CSI & ISTE. His research focuses on the Computer Networks, Mobile & Cloud Computing.

@IJAERD-2018, All rights Reserved

348

A privacy preserving user authentication scheme for wirelesssensor network users ijaerdv05i0239809  
A privacy preserving user authentication scheme for wirelesssensor network users ijaerdv05i0239809  
Advertisement