Skip to main content
Log in

A secure authentication framework for WSN-based safety monitoring in coal mines

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

Underground coal mines are considered as one of the most dangerous workspaces as many hazardous factors regularly cause accidents. It may be avoided by real-time monitoring of environmental parameters (gas, temperature, the width of walls, etc.) of underground tunnels. Nowadays, wireless sensor network (WSN) is widely used for safety monitoring of coal mines. However, any kind of interception, modification and interruption of transmission of environmental parameters can mislead the professionals that might lead to a major accident. Therefore, security is an essential issue for WSN-based safety monitoring. Sensors in WSN have limited computational power and storage capacity, which creates a challenge to design authentication and key agreement (AKA) scheme with low computational cost. To address these issues, As this scheme is light-weight and provides mutual authentication (MA), sensor anonymity (SA) and user anonymity (UA), we have considered this scheme for a case study. We first propose the cryptanalysis of this scheme, in which we prove that this scheme fails to resist sensor node compromise (SNC), stolen smart card (SSC) and user impersonation (UI) attacks. To counteract these attacks and to provide efficient authentication scheme, we propose a lightweight AKA scheme for WSN-based safety monitoring in coal mines. We simulated the scheme on AVISPA tool. We used the random oracle model (ROM) to perform formal security analysis and also performed informal security analysis. These analyses demonstrate that the proposed scheme is secure and invulnerable to various known attacks. We compared the proposed scheme to other related schemes regarding security features and computational cost. Our scheme requires comparable computational cost and is more secure than related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12

Similar content being viewed by others

References

  1. Kumar D, Chand S and Kumar B 2018 Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J. Ambient Intell. Humaniz. Comput. 1–20

  2. Zhao G 2011 Wireless sensor networks for industrial process monitoring and control: a survey. Netw. Protoc. Algorithms 3: 46–63

    Google Scholar 

  3. Guha A and Kumar K V 2012 Structural controls on coal fire distributions – Remote sensing based investigation in the Raniganj coalfield, West Bengal. J. Geol. Soc. India 79: 467–475

    Article  Google Scholar 

  4. Wang J, Liu T, Song G, Xie H, Li L, Deng X and Gong Z 2014 Fiber Bragg grating (FBG) sensors used in coal mines. Photon. Sens. 4: 120–124

    Article  Google Scholar 

  5. Kumar A, Kingson T M G, Verma R, Mandal R, Dutta S, Chaulya S K and Prasad G 2013 Application of gas monitoring sensors in underground coal mines and hazardous areas. Int. J. Comput. Technol. Electron. Eng. 3: 9–23

    Google Scholar 

  6. Bhattacharjee S, Roy P, Ghosh S, Misra S, and Obaidat M S 2012 Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines. J. Syst. Softw. 571–581

  7. Chehri A, Farjow W, Mouftah H T and Fernando X 2011 Design of wireless sensor network for mine safety monitoring. In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, pp. 001532–001535

  8. Chehri A, Fortier P, and Tardif P M 2009 UWB-based sensor networks for localization in mining environments. Ad Hoc Networks 7: 987–1000

    Article  Google Scholar 

  9. Mishra P K, Kumar S, Kumar M, and Kumar J 2019 IoT based multimode sensing platform for underground coal mines. Wirel. Pers. Commun. 108: 1227–1242

    Article  Google Scholar 

  10. Moridi M A, Kawamura Y, Sharifzadeh M, Chanda E K, Wagner M, Jang H and Okawa H 2015 Development of underground mine monitoring and communication system integrated ZigBee and GIS. Int. J. Min. Sci. Technol. 25: 811–818

    Article  Google Scholar 

  11. Al-Karaki J N and Kamal A E 2004 Routing techniques in wireless sensor networks: a survey. IEEE Wirel. Commun. 11: 6–28

    Article  Google Scholar 

  12. Wong K H M, Zheng Y, Cao J, and Wang S 2006 A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, (SUTC’06), 1: 244–251

  13. Das M L 2009 Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8: 1086–1090

    Article  Google Scholar 

  14. Tseng H R, Jan R H and Yang W 2007 An improved dynamic user authentication scheme for wireless sensor networks. In: Proceedings of IEEE GLOBECOM 2007—2007 IEEE Global Telecommunications Conference, pp. 986–990

  15. Huang H F, Chang Y F and Liu C H 2010 Enhancement of two-factor user authentication in wireless sensor networks. In: 2010 Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 27–30

  16. He D, Gao Y, Chan S, Chen C and Bu J 2010 An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 10: 361–371

    Google Scholar 

  17. Ko L C 2008 A novel dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the 2008 IEEE International Symposium on Wireless Communication Systems, pp. 608–612

  18. Vaidya B, Rodrigues J J and Park J H 2010 User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int. J. Commun. Syst. 23: 1201–1222

    Article  Google Scholar 

  19. Kim J, Lee D, Jeon W, Lee Y, and Won D 2014 Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14: 6443–6462

    Article  Google Scholar 

  20. Yeh H L, Chen T H, Liu P C, Kim T H and Wei H W 2011 A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11: 4767–4779

    Article  Google Scholar 

  21. Shi W and Gong P 2013 A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. 9: 730831

    Article  Google Scholar 

  22. Choi Y, Lee D, Kim J, Jung J, Nam J and Won D 2014 Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14: 10081–10106

    Article  Google Scholar 

  23. Kumar P, Lee S-G, and Lee H-J 2012 E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12: 1625–1647

    Article  Google Scholar 

  24. He D, Kumar N, Chen J, Lee C C, Chilamkurti N and Yeo S S 2015 Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21: 49–60

    Article  Google Scholar 

  25. Nam J, Choo K K R, Han S, Kim M, Paik J, and Won D 2015 Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLoS One 10: e0116709

    Article  Google Scholar 

  26. Li X, Niu J, Kumari S, Liao J, Liang W and Khan M K 2016 A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Netw. 9: 2643–2655

    Article  Google Scholar 

  27. Xue K, Ma C, Hong P and Ding R 2013 A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36: 316–323

    Article  Google Scholar 

  28. Li C T, Weng C Y, and Lee C C 2013 An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13: 9589–9603

    Article  Google Scholar 

  29. Turkanović M, Brumen B and Hölbl M 2014 A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 20: 96–112

    Article  Google Scholar 

  30. Chang C C and Le H D 2016 A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 15: 357–366

    Article  Google Scholar 

  31. Kumari S and Om H 2016 Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput. Netw. 104: 137–154

    Article  Google Scholar 

  32. Kocher P, Jaffe J and Jun B 1999 Differential power analysis. Berlin–Heidelberg: Springer, pp. 388–397

  33. Messerges T S, Dabbish E A and Sloan R H 2002 Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51: 541–552

    Article  MathSciNet  Google Scholar 

  34. Das A K 2017 A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. 30: e2933

    Article  Google Scholar 

  35. Chandrakar P and Om H 2017 A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC. Comput. Commun. 110: 26–34

    Article  Google Scholar 

  36. Automated validation of internet security protocols and applications [Online]. Available: http://www.avispa-project.org

  37. Dolev D and Yao A C 1983 On the security of public key protocols. IEEE Trans. Inf. Theory 29: 198–208

    Article  MathSciNet  Google Scholar 

  38. Glouche Y, Genet T, Heen O and Courtay O 2006 A security protocol animator for AVISPA. In: Proceedings of the ARTIST2 Workshop on Security Specification and Verification of Embedded Systems, Pisa

  39. Gope P and Hwang T 2016 A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63: 7124–7132

    Article  Google Scholar 

  40. Kilinc H H and Yanik T 2013 A survey of SIP authentication and key agreement schemes. IEEE Commun. Surv. Tutorials 16: 1005–1023

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to BHARAVI MISHRA.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

ANSARI, A.A., GERA, P., MISHRA, B. et al. A secure authentication framework for WSN-based safety monitoring in coal mines. Sādhanā 45, 98 (2020). https://doi.org/10.1007/s12046-020-1319-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12046-020-1319-2

Keywords

Navigation