An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
    Abstract— Internet of Things (IoT), is an interconnection of          al.[2] scheme still cannot preserve user anonymity and also
heterogeneous       devices    in    terms      of   computational,       vulnerable to offline password guessing attack, stolen verifier
communication, energy efficient competences over public                   attack and proposed an improved scheme. In this paper we
insecure communication channel called Internet. Through                   will show that C.G MA et al. [3] scheme still cannot preserve
advancement in mobile and communication technologies, users               user anonymity under their assumption and still vulnerable to
can connect to remote servers ubiquitously through a 'thing' or           stolen verifier attack.
device which is a part of IoT. Insecure nature of Internet and
resource constrained nature of devices or things which are part               The remainder of this paper is organized as follows: In
of IoT demands for remote user authentication protocols which             section 2, we briefly review C.G MA et al. [3] authentication
are extremely secure, light weight and energy efficient. In this          scheme. Section 3 describes the weaknesses of C.G MA et al.
context, C.G MA et al proposed a new dynamic ID based                     scheme. In Section 4, our improved scheme is presented and
authentication scheme. In this manuscript we will illustrate that         its security analysis is discussed in section 5.The comparison
C.G MA et al. scheme cannot preserve user anonymity under                 of the performance of our scheme with other related schemes
their hypothesis and susceptible to stolen verifier attack. In            is shown in section 6 and section 7 concludes the paper..
addition, we will confirm that their scheme is heavy weight and
needs more energy. We then present our improved scheme which
is a generalized one, which is secure, light weight and energy                II.   ASSESSMENT OF CHUN-GUANG MA ET AL. SCHEME
efficient, while protecting the merits of different dynamic identity           In this section, we examine the improved authentication
based authentication schemes.                                             scheme proposed by C.G MA et al. [3] in 2012. The scheme is
                                                                          composed of four phases: the registration, login, verification
   Keywords—Energy Efficient computing, Authentication                    and session key agreement phase and password alter stage.
protocol, User Anonymity, Dynamic ID, Smart Card, Remote user             The representations used in C.G MA et al. [3] scheme are
authentication.
                                                                          listed below:
                        I.    INTRODUCTION                                Ui: The user trying to access the remote server resources
                                                                          IDi: The identity of Ui
    Accessing server resources securely through open insecure
                                                                          Pi: The password of Ui
communication networks is one of the common scenarios in
                                                                          S: The remote server or system
client-server applications. The primary requirement for these
kinds of scenarios is to authenticate the remote user, whether a          X: The secret key of S
valid smart card holder is having the rights and privileges to            yi: Secret number of the system, stored in the smart card of
access the server resources. To solve this problem lots of                each registered user Ui
researchers proposed remote user authentication schemes with              ْ: The exclusive - OR (XOR) operation.
smartcards [1-7,11-19] to authenticate a legitimate user, but             ||: String concatenation operator.
none of them can address all possible security problems and               A*: ‘A’ calculated value
with-stand all possible attacks [1,3-5,9,14-19,21]. In addition           x1, x2 : Secret keys of server S
most of the schemes proposed [13, 17, 18] do not preserve                 bi : Random number chosen by user Ui
user anonymity. Most of the proposed schemes assume that
the smart card is tamper resistant i.e., (not possible to extract          Registration Phase
the protected software and user specific data from smartcard                 The server S performs following operations in registration
processors). Some schemes [8,9,10] shown that the secret data             phase.
stored in the smart card can be extracted by means such as                R1.Produce two large prime numbers p and q. Computes:
Micro probing, Software attacks, Eaves dropping, Fault
                                                                          n=p.q.
generation and monitoring the power consumption etc. The
above mentioned attacks clears that the adversary can tamper              R2. Picks prime number e, d such that e.d = 1 mod (p-1)(q-1)
and extract the data from the tamper-resistant smart cards.               R3. ‘S’ makes e, n public and p,q,d known only to server S.
                                                                          R4. Server ‘S’ authenticates itself to the user Uu using its
    In 2011Sood et al. [2] shown that the Wang et al. [1]                 public key certificate. Uu generates and encrypts the session
scheme is vulnerable to impersonation attack, stolen smart                key SS with the public key (PK) of the server as (SS)PK
card attack, offline password guessing attack and proposed an             R5. Ui->S:(SS)PK,(IDi)SS, (Pi)SS.
improved scheme and claimed that their scheme is efficient                R6. In receipt of the registration communication from Uu, S
and can overcome all the identified security drawbacks of                 decrypts the session key (SS) using its public key (PK) and
Wang et al.’s scheme even if the data stored in the smart card            decrypts (IDu)SS, (Pu)SS using the session key.
is leaked out. In 2012 C.G MA et al.[3] shown that Sood et
978-1-4799-6629-5/14/$31.00 2014
                            c     IEEE                                 1296
R7. Server pick out an arbitrary value yu and frames Nu =          value yu assigned by the server to him as follows: yu = Buْ
h(IDu|| Pu)ْh(d), Au = h(Pu||IDu)ْh(yu), Bu = yuْIDuْPu,           IDuْPu.
Du = h(h(IDu||yu)ْd). S chooses yu corresponding to each user
                                                                   3.2 Fails toResists Stolen Verifier Attack
to make Du unique for each user. The server S stores yuْ
h(h(d)||d)and IDuْh(d||yu) corresponding to each Du in the              In this type of attack, as discussed in [3,19] if the
database.                                                          malignant legal user ‘Uu’ steals the verification table or got
R8. S issues a smart card to user Uu enclosing                     access to it, ‘Uu’ can find out the secret unknown values
(Nu,Au,Bu,n,e,h(.)) over a secure communication channel.           corresponding to users of the system. In C.G. MA et al.[3]
                                                                   scheme, server ‘S’ stores yuْh(h(d)||d) and IDuْh(d||yu)
Login Stage                                                        corresponding to each Du in the database, where Du =
   When user Uu tries to login into the system, the following      h(h(IDu||yu)ْd) and S chooses yu corresponding to each user
operations are performed.                                          to make Du unique for each user, where u = 1,2,….n. The
L1. Uu inserts his/her smart card into the card reader and         value yuْh(h(d)||d) contains yu and h(h(d)||d) in which
inputs IDu* and Pu*.                                               h(h(d)||d) is same for all users. As discussed in (3.1), ‘Uu’ can
L2. Smart card computes yu*= BuْIDu*ْPu*, uses yu* to              get yu from the values stored in his smart card and can
compute Au* = h(Pu*||IDu*)ْh(yu*), and check whether               intercept h(h(d)||d) from yuْh(h(d)||d) as h(h(d)||d) =
computed Au* equals to the cached Au. If both are equal, then      (yuْh(h(d)||d)) ْ yu (Uu knows his yu). Now the malicious
the smart card proceeds by choosing a random number Ru and         legal user after getting h(h(d)||d), which is same for all users
computes h(d) = Nuْh(IDu||Pu). S frames CIDu = h(IDu||yu)          can get yk value of any legal user Uk by performing
ْh(h(d)||Ru||T), Ci= Rue mod n, and Mi= h(IDu||h(d)||              Fkْh(h(d)||d) = yk where Fk = ykْh(h(d)||d). By this fashion,
yu||T||Ru), where T is the current date and time. Otherwise, the   a legal user can get yi, values of all users in the system and use
session is terminated.                                             those values for further cryptanalysis.
L3.Ui->S: {CIDu,Cu,Mu,T}.                                          3.3 Fails toResists Offline Password Guessing Attack
Verification and Session Agreement Stage                                An attacker or opponent ‘E’ who is a legal insider, having
   Once the login request is acquired from user Uu, the server     intercepted the yi values of all the users as discussed in 3.2 can
S implement the succeeding operations.                             get the password Pu and the identity IDu of Uu is as follows.
                                                                   Assume that ‘E’ got the smart card of a legal user Uu for a
A1.Server S authorizes the validity of time interval by            while or stolen it, ‘E’ will get Nu, Au, Bu where Nu = h(IDu||
checking (T’-T) <= ¨t, where T’ is date and time at which the      Pu)ْh(d), Au = h(Pu||IDu)ْh(yu), Bi = yuْIDuْPu. ‘E’ can
request is acknowledged by server S and ¨t is accepted time        perform the following steps:
interval. The server S decrypts the arbitrary number Ru from       Step1: frame Au = h(Pu ||Buْ yuْPu)ْh(yu) from Buْ yuْ
Cu using its private key d using Ru, it computes Du* =             Pu = IDu
h(CIDuْh(h(d)||Ru||T)ْd) and finds corresponding row for           Step 2: Guess a password Pu* from a uniformly distributed
Du*. Now the server S computes yu from yuْh(h(d)||d) and IDu       dictionary and compute Au* = h(Pu* ||BuْyuْPu*)ْh(yu) and
from IDuْh(d||yu) as server knows the value of d.                  audit whether Au* = Au. If yes, the correct password is Pu* else
A2. The server S computes Mu* = h(IDu||h(d)||yu||T||Ru) and        ‘E’ rerun the execution of step2. After getting correct Pu of
equates the computed Mu* with the received Mu. If both are         Uu, ‘E’ can get IDu from Bu as follows. IDu = BuْyuْPu. So
equivalent, the server S authenticates the user Uu and             a legal user by getting the verifier table and smart card of user
connection is established else the connection is finished.         Uu can get yu ,Pu and IDu.
A3. The user Uu and the server S agree on the common session
key SK = h(h(d)||IDu||T||yu). The supplementary data               3.4 Fails toResists User Impersonation Attack
transmitted between the user Uu and S is encrypted with SK.           An attacker ‘E’ who is a legal user can impersonate another
                                                                   legal user Uu of Server S as follows. After capturing the Uu’s
      III.   CRYPTANALYSIS OF C.G MA ET AL. SCHEME                 login request message i.e.,{CIDu, Cu, Mu, T}.Whenever ‘E’
    In this segment, we will exhibit that Chun-Guang MA et         wants to impersonate Uu, ‘E’ can direct a counterfeit login
al. scheme cannot restrain any of the attacks they allege that     request message CIDu*, Cu*, Mu* to S where CIDu*=h(IDu||yu)
their scheme will block and still unsafe to various major          ْh(h(d)||Ru1||T*), Cu* = Ru1e mod n. Mu*=h(IDu||h(d)|| yu||T* ||
attacks as examined below.                                         Ru1) with suitable T*, the login request will clear Step A1 of S.
                                                                   Only value attacker needs to take attention is T. ‘E’ can find
3.1 Revealing of Secret Key of Server to Legal User                out the valid T by eaves dropping the communication between
  A legal user Uu who is having a legitimate access to the         Uu and S.
system can achieve the secret data cached in his smart card by     3.5 Fails toResists Server Masquerading Attack
some means [8, 9,10] then he can acquire the private key h(d)
of server S as shown. Once Uu extracted Nu, Nu=h(IDu||Pu) ْ           To masquerade as remote server S, an attacker ‘E’ must
h(d), as Uu already realize his identity IDu and password Pu, Uu   capable to frame, encrypt and decrypt the messages with the
can achieve h(d) = Nuْh(IDu||Pu). Similarly Uu can derive the      session key between Uu and S. Once the attacker ‘E’ upon
                                                                   capturing the login message {CIDu,Cu,Mu,T}, analyzes all the
Login Phase:
TYPES OF USER VALUES KNOWN TO THE USER VALUES DOESN’T KNOWN TO THE USER
5.2 Prevention of Stolen Verifier Attack                                                           VI.       COST AND SECURITY ANALYSIS
     In the proposed scheme h(IDi||yi||x1||bi||T) acts as an index                     In this section we scrutinize communication and
into the server database. Corresponding to h(IDi||yi||x1||bi||T), S                computation cost requisite by our protocol and we equate the
stores (bi||yi)ْh(x1||x2) and (IDi||yi) ْh(x2||x1). The                            same with significant protocols. The IDi,Time stamp all are
adversary can frame h(IDi||yi||x1||bi||T) from CIDi of Ui i.e.,                    128 bits long. The output of Hash function is 128-bit. n,e,d
h(IDi||yi||x1||bi||T)=CIDiْT and can index into the database to                    requires 1024 bits [19]. H, E, S designates the time complexity
get (bi||yi)ْh(x1||x2) and (IDi||yi)ْh(x2||x1). As discussed, an                   for hash function, exponential operation and symmetric key
adversary doesn’t know either (bi||yi), (IDi||yi) of user Ui and                   encryption correspondingly. The cost and energy efficiency
(x1||x2), (x2||x1) of S. Hence it’s not probable for an adversary                  assessment of the proposed scheme with the correlated smart
to find out any value of Ui. In case of a legal user himself                       card based authentication schemes is concise in Table 3. The
trying to perform stolen verifier attack can frame h(IDi||yi                       proposed scheme has less computation cost and more energy
||x1||bi||T) from his own CIDi and by indexing can get (bi                         efficient compared to latest scheme proposed by C.G MA et
||yi)ْh(x1||x2) and (IDi||yi)ْh(x2||x1).We have shown that                         al. [3] and other related dynamic ID-based schemes.
even legal user doesn’t know his own yi, hence, it’s not
possible even for legal user to find out any unknown value.                                                  VII.          CONCLUSION
Therefore, in our scheme either legal user or legal adversary                          Recently C.G MA et al. scheduled an authentication
cannot find out any unknown value from stolen verifier attack.                     scheme using smart cards. In this paper we have presented that
5.3 Resistance to User Impersonation Attack                                        C.G MA et al. scheme unsafe to all leading cryptographic
                                                                                   attacks. In inclusion, we have put forward our augmented
    To impersonate a user Ui, a legal adversary ‘E’ must                           scheme which is secure, even the adversary pick up the smart
counterfeit a login message CIDi*,Mi*,T*to the remote server S                     card and the server data base. We also correlate our scheme
by altering CIDi,Mi,T of Ui. ‘E’ must identify the IDi, yi,bi of                   with Sood et al., Khan et al. and other consistent smart card
Ui and x1,x2 of server ‘S’ to frame a valid CIDi*,Mi*. As                          authentication protocols and presented that our scheme
shown in 5.1, 5.2 it is computationally infeasible for E to                        obligates minimum computation and communication cost and
intercept the unknown values of Ui. Hence, in our scheme it is                     yield high level of security and energy efficiency which makes
impossible for anyone to impersonate a legal user Ui.                              our scheme eligible to use in practical scenarios.
5.4 Resistance to Server Masquerade Attack                                                    TABLE II.        COMPARISON OF SECURITY FEATURES
      To masquerade as remote server S,a legal adversary E                                                    Ours         [3]     [2]       17]        [18]
must frame a session key SK = h(yi||x1||bi||IDi||yi||x2||T) shared                     Provides User
                                                                                                                Y          N       N          N          N
between S and Ui. As shown in 5.1, 5.2, 5.3 it is                                       Anonymity
computationally infeasible for E to derive IDi, yi,bi of Ui and                        Resists offline
                                                                                     password guessing          Y          N       N          N          N
x1,x2 of server S. Hence, in our scheme it is impossible for                               attack
anyone to masquerade as server. Therefore, from 5.3 and 5.4,                            Resists user
                                                                                                                Y          N       N          N          N
we can accomplish that our scheme counterattacks Man in the                         impersonation attack
Middle attack.                                                                       Resists user server
                                                                                                                Y          N       N          N          N
                                                                                     masquerade attack
5.5 Resistance to Framing of the Session key by an Adversary
    In our scheme, the session key S.K = h(yi||x1                                   Stolen verifier attack      Y          N       N          N          N
||bi||IDi||yi||x2||T). To frame the session key, the attacker ‘E’
                                                                                    Resists replay attack       Y          N       N          N          N
requires yi, x1, bi, IDi, yi, x2, T. As shown in 5.1, 5.2, it is
computationally infeasible for E to capture the unknown                             Resists Denial-of-
                                                                                                                Y          N       N          N          N
                                                                                      Service attack
values of Ui. Hence, in our scheme it is incredible for an                           Provides strong
adversary to frame the session key.                                                                             Y          N       N          N          N
                                                                                   mutual authentication