An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

被引:44
作者
Lu, Yanrong [1 ,2 ]
Li, Lixiang [1 ,2 ]
Peng, Haipeng [1 ,2 ]
Yang, Yixian [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
anonymity; mutual authentication; wireless sensor networks; smart card; 2-FACTOR USER AUTHENTICATION; SECURITY; PROTOCOL; INTERNET;
D O I
10.3390/s16060837
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.
引用
收藏
页数:21
相关论文
共 32 条
[1]  
Amin R., 2015, AD HOC NETW, V20, P1
[2]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[3]  
[Anonymous], 2016, SHA 3 STAND
[4]  
[Anonymous], 2016, FIPS PUB
[5]  
[Anonymous], IACR CRYPTOLOGY EPRI
[6]  
[Anonymous], 2010, 2010 Proceedings IEEE INFOCOM
[7]  
Blake-Wilson S., 1997, P 6 IMA INT C CRYPT
[8]   The science of guessing: analyzing an anonymized corpus of 70 million passwords [J].
Bonneau, Joseph .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :538-552
[9]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[10]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366