Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments

被引:32
作者
Chen, Chi-Tung [1 ]
Lee, Cheng-Chi [2 ,3 ]
Lin, Iuon-Chang [3 ,4 ]
机构
[1] Natl Chin Yi Univ Technol, Dept Distribut Management Informat Management, Taichung, Taiwan
[2] Fu Jen Catholic Univ, Res & Dev Ctr Phys Educ Hlth & Informat Technol, Dept Lib & Informat Sci, New Taipei, Taiwan
[3] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
[4] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
关键词
2-FACTOR USER AUTHENTICATION; WIRELESS SENSOR NETWORKS; ROAMING SERVICE; SCHEME; ROBUST; IMPROVEMENTS; INTERNET; THINGS; ECC;
D O I
10.1371/journal.pone.0232277
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researchers have published effective (but not entirely secure) approaches for merging WSNs into IoT environments. In IoT environments, the security effectiveness of remote user authentication is crucial for information transmission. Computational efficiency and energy consumption are crucial because the energy available to any WSN is limited. This paper proposes a notably efficient and secure authentication scheme based on temporal credential and dynamic ID for WSNs in IoT environments. The Burrows-Abadi-Needham (BAN) logic method was used to validate our scheme. Cryptanalysis revealed that our scheme can overcome the security weaknesses of previously published schemes. The security functionalities and performance efficiency of our scheme are compared with those of previous related schemes. The result demonstrates that our scheme's security functionalities are quantitatively and qualitatively superior to those of comparable schemes. Our scheme can improve the effectiveness of authentication in IoT environments. Notably, our scheme has superior performance efficiency, low computational cost, frugal energy consumption, and low communication cost.
引用
收藏
页数:28
相关论文
共 49 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]   A robust mutual authentication protocol for WSN with multiple base-stations [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Obaidat, Mohammad S. .
AD HOC NETWORKS, 2018, 75-76 :1-18
[3]   An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 :133-144
[4]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[5]  
Benenson Z, 2004, P INF SEP
[6]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[7]  
Callaway EdgarH., 2004, INTERNET COMMUN SER
[8]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[9]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[10]  
Chang CC, 2011, INT J INNOV COMPUT I, V7, P4589