Security Enhancement to an Biometric Authentication Protocol for WSN Environment

WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계

  • 이영숙 (호원대학교 사이버수사보안학부)
  • Received : 2016.10.05
  • Accepted : 2016.10.20
  • Published : 2016.10.30

Abstract

Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

바이오메트릭 정보를 이용한 인증방식은 사용자의 신체정보를 이용하여 신원을 확인 하고 시스템의 접근을 허가한다. 요즘 들어, 패스워드나 보안토큰을 단독으로 이용하는 방식보다는 하나이상의 고유한 신체적, 행동적 형질에 기반하여 개인의 생체 정보인 지문, 홍채 얼굴, 정맥 등을 활용하는 방식이 점차 증가하고 있는 추세이다. 2013년 Althobati 등이 WSN(Wireless Sensor Networks) 환경에 적합한 바이오메트릭 정보를 이용한 사용한 사용자 인증 스킴을 제안하였다. 그러나 그들이 제안 프로토콜은 데이터 무결성에 대한 위협과 바이패싱 게이트웨이 공격에 취약하여 상호인증을 달성할 수 없었다. 본 논문은 이전에 제안된 논문의 취약점을 개선하여 WSN 환경에 적합한 안전한 프로토콜을 제안하였다

Keywords

References

  1. O. Althobaiti ,M. Al-Rodhaan, and A. Al-Dhelaan, An Efficient Biometric Authentication Protocol for Wireless Sensor Networks, International Journal of Distributed Sensor Networks Volume 2013, Article ID 407971, 13 pages
  2. Rawat, P.; Singh, K.; Chaouchi, H.; Bonnin, J. Wireless sensor networks: A survey on recent developments and potential synergies. J. Supercomput. 2014, 68, 1-48. https://doi.org/10.1007/s11227-013-1021-9
  3. Z. Cheng, Y. Lee, C. Chang, C. L, A novel biometric-based remote user authentication scheme using Quadratic Residues, International Journal of Information and Electronics Engineering, 3{4} (2013) 419-422.
  4. Yuan, C. Jiang, and Z. Jiang, A biometric-based User Authentication for wireless Sensor Networks, Wuhan university journal of national sciences 5(3) (2010) 272-276.
  5. E.-J. Yoon, K. Y. Yoo, A new biometric-based user authentication scheme without using password for wireless sensor networks, Proceedings of 2011 IEEE International workshops of enabling technologies: Infrastructure for collaborative enterprises, (2011) 279-284
  6. Y. Lee, Security Analysis of a Biometric-Based User Authentication Scheme, The Korea-Society of Digital Industry& Information Management, 10(1), (2014), 81---87
  7. Y. Choi, Y. Lee, D. Won, Security Improvementon Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction, International Journal of Distributed Sensor Networks Volume 2016, Article ID 8572410, 16 pages http://dx.doi.org/10.1155/2016/8572410
  8. Y. Lee, Security Analysis to an Biometric Authentication Protocol for wireless Sensor Networks, The Korea-Society of Digital Industry& Information Management, 1 (1) (2015) 59-67