A novel two-factor multi-gateway authentication protocol for WSNs

被引:8
作者
Chen, Chen [1 ,2 ]
Guo, Hua [1 ,2 ]
Wu, Yapeng [1 ]
Gao, Ya [3 ]
Liu, Jianwei [1 ]
机构
[1] Minist Ind & Informat Technol, Key Lab Aerosp Network Secur, Beijing 100191, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100000, Peoples R China
[3] Beijing Res Inst Telemetry, Beijing 100094, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金; 国家重点研发计划;
关键词
Authentication and key agreement protocol; Wireless sensor networks; Multi-gateway; Password and identity guessing attack; Forward security; ECC; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; EFFICIENT USER AUTHENTICATION; MUTUAL AUTHENTICATION; 3-FACTOR AUTHENTICATION; SECURE; INTERNET; LIGHTWEIGHT; EXCHANGE;
D O I
10.1016/j.adhoc.2023.103089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With Wireless Sensor Networks(WSNs) rapid development, it is a hot topic that designing a secure and effective authentication protocol to guarantee the safety of WSNs. Many two-factor multi-gateway authentication protocols have been proposed for WSNs. However, almost all the known protocols were found insecure. Especially, all the existing two-factor multi-gateway authentication protocols cannot resist the password and identity(ID) guessing together with the smart card loss attack. We present a novel two-factor multi-gateway authentication protocol based on password and smart card in multi-gateway wireless sensor networks in this paper. Thanks to "fuzzy-verifier" and "honeywords" technique, the new protocol can effectively resist the joint password and identity guessing with the smart card loss attack. In addition, key negotiation is based on discrete elliptic curve encryption, which ensures forward security of the protocol and resists sensor capture attack. Subsequently, we use BAN-logic to ensure the authentication is implemented, and the session key is negotiated. Moreover, a formal security proof of the new protocol based on the game sequence is conducted in Random Oracle model (RO model). Finally, we compare our work with other schemes in the same field in terms of security, communication efficiency and computational efficiency.
引用
收藏
页数:14
相关论文
共 47 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
    Adavoudi-Jolfaei, AmirHosein
    Ashouri-Talouki, Maede
    Aghili, Seyed Farhad
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) : 43 - 59
  • [3] Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Leng, Lu
    Kumar, Neeraj
    [J]. COMPUTER NETWORKS, 2016, 101 : 42 - 62
  • [4] A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    Amin, Ruhul
    Biswas, G. P.
    [J]. AD HOC NETWORKS, 2016, 36 : 58 - 80
  • [5] An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks
    Azees, Maria
    Vijayakumar, Pandi
    Karuppiah, Marimuthu
    Nayyar, Anand
    [J]. WIRELESS NETWORKS, 2021, 27 (03) : 2119 - 2130
  • [6] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
  • [7] BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
  • [8] A Robust Mutual Authentication Protocol for Wireless Sensor Networks
    Chen, Tien-Ho
    Shih, Wei-Kuan
    [J]. ETRI JOURNAL, 2010, 32 (05) : 704 - 712
  • [9] Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Choi, Younsung
    Lee, Donghoon
    Kim, Jiye
    Jung, Jaewook
    Nam, Junghyun
    Won, Dongho
    [J]. SENSORS, 2014, 14 (06) : 10081 - 10106
  • [10] An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sutrala, Anil Kumar
    Kumari, Saru
    Odelu, Vanga
    Wazid, Mohammad
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2070 - 2092