A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

被引:189
作者
Gope, Prosanta [1 ]
Hwang, Tzonelih [2 ]
机构
[1] Singapore Univ Technol & Design, Ctr Res Cyber Secur, ITrust, Singapore 487372, Singapore
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
Mutual authentication; user anonymity; wireless sensor network (WSN); 2-FACTOR USER AUTHENTICATION; MUTUAL AUTHENTICATION; KEY AGREEMENT; SCHEME; FRAMEWORK;
D O I
10.1109/TIE.2016.2585081
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environment is a paramount security concern. Until now, impressive efforts have been made for designing authentication schemes with user anonymity by using only the lightweight cryptographic primitives, such as symmetric key encryption/decryption and hash functions. However, to the best of our knowledge, none has succeeded so far. In this paper, we take an initial step to shed light on the rationale underlying this prominent issue. In order to do that here at first, we demonstrate that the existing solutions for anonymous user authentication in WSN are impractical. Subsequently, we propose a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc.
引用
收藏
页码:7124 / 7132
页数:9
相关论文
共 29 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[6]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[7]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]   An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks [J].
Fan, Rong ;
He, Dao-jing ;
Pan, Xue-zeng ;
Ping, Ling-di .
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (07) :550-560
[10]  
Gnawali O., 2006, Proceedings of the 4th international conference on Embedded networked sensor systems, P153