A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor

被引:2
作者
Paul, Rituparna [1 ]
Rai, Shanvendra [2 ]
Banerjee, Subhasish [2 ]
Meher, Preetisudha [1 ]
机构
[1] Natl Inst Technol Arunachal Pradesh, Dept Elect & Commun Engn, Jote 791113, Arunachal Prade, India
[2] Natl Inst Technol Arunachal Pradesh, Dept Comp Sci & Engn, Jote 791113, Arunachal Prade, India
关键词
Fuzzy; Authentication; Smart Card; Session Key Agreement; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; LIGHTWEIGHT; INTERNET; EFFICIENT; PROTOCOL;
D O I
10.1007/s12083-023-01583-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Wireless Sensor Networks (WSN) uses the open channel for communication between the end users and the resource-constrained sensors; maintaining privacy and security is always a challenging task. In this context, Khalid et al. proposed a biometric-based user authentication and Key agreement (AKA) scheme in WSN based on intelligent sensors. However, during this research, it is found that the schemes have many computational flaws and are under the threat of different attacks, such as Impersonation attacks, Stolen Smart Card (SC) attacks, etc. So, to overcome the vulnerabilities found in Khalid et al.'s scheme, an improved robust mutual AKA scheme for WSNs having intelligent sensors is proposed in this article. Moreover, the correctness of the scheme is verified by Burrows-Abadi-Needham (BAN) logic, and the security is proved by Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool. Through various security analysis, performance evaluation and comparison with the existing related schemes shows that the proposed scheme could not only highly resistance against various well-known attacks than others but also maintain the low cost at sensor nodes, as well.
引用
收藏
页码:432 / 450
页数:19
相关论文
共 47 条
[1]  
Allahham AA, 2018, Int. J. Softw. Eng. Comput. Syst., V4, P1, DOI DOI 10.15282/IJSECS.4.1.2018.1.0034
[2]   An Efficient Biometric Authentication Protocol for Wireless Sensor Networks [J].
Althobaiti, Ohood ;
Al-Rodhaan, Mznah ;
Al-Dhelaan, Abdullah .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]  
Avispa S, 2019, SECURITY PROTOCOL AN
[5]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[6]   Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications [J].
Chen, Chien-Ming ;
Wang, King-Hang ;
Yeh, Kuo-Hui ;
Xiang, Bin ;
Wu, Tsu-Yang .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) :3133-3142
[7]   An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks [J].
Chen, Chien-Ming ;
Xiang, Bing ;
Wu, Tsu-Yang ;
Wang, King-Hang .
APPLIED SCIENCES-BASEL, 2018, 8 (07)
[8]   An enhanced authentication scheme in mobile RFID system [J].
Chiou, Shin-Yan ;
Chang, Shan Yen .
AD HOC NETWORKS, 2018, 71 :1-13
[9]   SAPWSN: A Secure Authentication Protocol for Wireless Sensor Networks [J].
Darbandeh, Foroozan Ghosairi ;
Safkhani, Masoumeh .
COMPUTER NETWORKS, 2023, 220
[10]   Provably secure user authentication and key agreement scheme for wireless sensor networks [J].
Das, Ashok Kumar ;
Kumari, Saru ;
Odelu, Vanga ;
Li, Xiong ;
Wu, Fan ;
Huang, Xinyi .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3670-3687