Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security

被引:14
作者
Jabbari, A. [1 ]
Mohasefi, J. B. [1 ,2 ]
机构
[1] Urmia Univ, Dept Comp Engn, Orumiyeh, Iran
[2] Urmia Univ, Dept Comp Engn, Fac Elect & Comp Engn, Orumiyeh, Iran
关键词
Internet of things; Wireless sensor network; User authentication; Elliptic curve cryptography; Protocol security; KEY AGREEMENT SCHEME; DYNAMIC IDENTITY; PROTOCOL; CARE;
D O I
10.1007/s11277-020-07811-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The internet of things (IoT) is the network of physical devices embedded with types of equipment which enables them to connect and exchange data. The IoT will provide an excellent chance for the integration of the physical world into computer-based systems. Wireless sensor networks (WSNs) are considered as a critical component of IoT networks, and user authentication is a cardinal issue in WSNs. Recently, Wu et al. (J Ambient Intell Humaniz Comput 8(1):101-116, 2017) proposed a new user authentication scheme for wireless sensor networks based on the Internet of Things security. This scheme is more valuable. Because it does not uses timestamps. Also, it provides strong forward security, it can resist the de-synchronization problem, and it is efficient. Unfortunately, in this paper, we will prove that Wu et al.'s scheme is vulnerable to user impersonation attack, gateway impersonation attack, man-in-the-middle attack, and sensor impersonation attack. Furthermore, we show that this scheme can not guarantee user anonymity. It is much worth to design a new security protocol with the same advantages as those of Wu et al.'s scheme. Therefore, we have put forward some improvements to dominate the weaknesses of Wu et al.'s protocol. We use the random oracle model to demonstrate the formal proof, and the security verification tool Proverif to demonstrate that the proposal can satisfy security and authentication features. The performance analysis and simulation results by NS2 indicate that the proposed protocol is efficient.
引用
收藏
页码:2565 / 2591
页数:27
相关论文
共 50 条
[1]   A New Certificateless and Secure Authentication Scheme for Ad hoc Networks [J].
Bakhtiari-Chehelcheshmeh, Shaghayegh ;
Hosseinzadeh, Mehdi .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) :2833-2851
[2]   On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System [J].
Byun, Jin Wook .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (04) :2329-2352
[3]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[4]   An improved and robust biometrics-based three factor authentication scheme for multiserver environments [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Farash, Mohammad Sabzinejad ;
Shon, Taeshik ;
Sher, Muhammad .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (08) :3504-3520
[5]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[6]   Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Choi, Younsung ;
Lee, Donghoon ;
Kim, Jiye ;
Jung, Jaewook ;
Nam, Junghyun ;
Won, Dongho .
SENSORS, 2014, 14 (06) :10081-10106
[7]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[8]  
Eun-Jun Yoon, 2011, 2011 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI-CC 2011), P392, DOI 10.1109/COGINF.2011.6016171
[9]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[10]  
Feng X, 2019, WIRELESS PERS COMMUN, V108, P1