Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things

被引:7
作者
Ding, Zixuan [1 ]
Xie, Qi [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
基金
中国国家自然科学基金;
关键词
authentication protocol; wireless sensor network; Internet of Things; privacy-preserving; provably secure; 2-FACTOR USER AUTHENTICATION; SCHEME; PASSWORD;
D O I
10.3390/su15075734
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Wireless sensor networks are a promising application of the Internet of Things in the sustainable development of smart cities, and have been afforded significant attention since first being proposed. Authentication protocols aim to protect the security and confidentiality of legitimate users when accessing and transmitting data. However, existing protocols may suffer from one or more security flaws. Recently, Butt et al. proposed an energy-efficient three-factor authentication protocol for wireless sensor networks. However, their protocol is vulnerable to several attacks, and lacks certain security properties. In this paper, the causes of these design flaws are analyzed. Furthermore, we propose a novel three-factor authentication protocol (password, smart card, and biometric information) for wireless sensor networks in Internet of Things contexts. A dynamic anonymous strategy is designed to prevent privacy disclosure and to resist sensor node capture attacks, tracking attacks, and desynchronization attacks. The Find-Guess model and random oracle model are combined to prove the security of the proposed protocol. A comparative analysis with related schemes shows that the proposed protocol has higher security and is able to maintain a low computational overhead.
引用
收藏
页数:16
相关论文
共 31 条
  • [1] Wireless Sensor Networks in Agriculture: Insights from Bibliometric Analysis
    Abdollahi, Alireza
    Rejeb, Karim
    Rejeb, Abderahman
    Mostafa, Mohamed M.
    Zailani, Suhaiza
    [J]. SUSTAINABILITY, 2021, 13 (21)
  • [2] Almulhim M, 2018, INT CONF ADV COMMUN, P481, DOI 10.23919/ICACT.2018.8323802
  • [3] Internet of Things Security: Challenges and Key Issues
    Azrour, Mourade
    Mabrouki, Jamal
    Guezzaz, Azidine
    Kanwal, Ambrina
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
  • [5] Cogent and Energy Efficient Authentication Protocol for WSN in IoT
    Butt, Tariq Mahmood
    Riaz, Rabia
    Chakraborty, Chinmay
    Rizvi, Sanam Shahla
    Paul, Anand
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 1877 - 1898
  • [6] A Particle Swarm Optimization and Deep Learning Approach for Intrusion Detection System in Internet of Medical Things
    Chaganti, Rajasekhar
    Mourade, Azrour
    Ravi, Vinayakumar
    Vemprala, Naga
    Dua, Amit
    Bhushan, Bharat
    [J]. SUSTAINABILITY, 2022, 14 (19)
  • [7] LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments
    Chaudhry, Shehzad Ashraf
    Yahya, Khalid
    Garg, Sahil
    Kaddoum, Georges
    Hassan, Mohammad Mehedi
    Zikria, Yousaf Bin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) : 1504 - 1511
  • [8] Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
    Chen, Chi-Tung
    Lee, Cheng-Chi
    Lin, Iuon-Chang
    [J]. PLOS ONE, 2020, 15 (04):
  • [9] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [10] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208