A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth

被引:30
作者
Chen, Yuwen [1 ]
Lopez, Lourdes [1 ]
Martinez, Jose-Fernan [1 ]
Castillejo, Pedro [1 ]
机构
[1] UPM, Dept Ingn Telemat & Elect DTE, ETSIST, C Nikola Tesla S-N, Madrid 28031, Spain
关键词
WIRELESS SENSOR NETWORKS; ANONYMOUS MUTUAL AUTHENTICATION; PROTOCOL; SECURE;
D O I
10.1155/2018/7574238
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Different data are collected by diverse sensors under an Internet of things scenario, such as health data, environmental data, and traffic flow data. People can access data remotely via the Internet easily. Considering the importance and confidentiality of these data, it is necessary to ensure the data security. In this study, we propose an authentication and key establishment scheme for an Internet of things scenario based on low-capability devices. This scheme achieves many security features: user anonymity, sensor anonymity, forward secrecy, resistance to the loss of synchronization problem, and so on We verified these security features using AVISPA and ProVerif; both results show that the scheme is safe enough to achieve the security requirements. Besides, the experiment results elucidate that this scheme gains an advantage in computation and communication costs. It is because of the sole usage of XOR operations and hash functions as well as a minimal amount of asymmetric encryptions to fulfil forward secrecy.
引用
收藏
页数:16
相关论文
共 29 条
[1]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[2]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[3]  
BASIN D, 2003, P 10 ACM C COMP COMM, P335
[4]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[5]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[6]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[7]   A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth [J].
Chen, Yuwen ;
Martinez, Jose-Fernan ;
Castillejo, Pedro ;
Lopez, Lourdes .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
[8]   Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Choi, Younsung ;
Lee, Donghoon ;
Kim, Jiye ;
Jung, Jaewook ;
Nam, Junghyun ;
Won, Dongho .
SENSORS, 2014, 14 (06) :10081-10106
[10]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176