Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme

被引:79
作者
Ostad-Sharif, Arezou [1 ]
Arshad, Hamed [2 ]
Nikooghadam, Morteza [1 ]
Abbasinezhad-Mood, Dariush [1 ]
机构
[1] Imam Reza Univ, Dept Comp Engn & Informat Technol, Mashhad, Razavi Khorasan, Iran
[2] Univ Oslo, Dept Informat, Oslo, Norway
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 100卷
关键词
Anonymity; Gateway node; IoT; Key agreement; Three factor authentication; WSN; 2-FACTOR USER AUTHENTICATION; WIRELESS SENSOR NETWORKS; MUTUAL AUTHENTICATION; EXCHANGE PROTOCOL; PROVABLE SECURITY; CHAOTIC-MAP; EFFICIENT; FRAMEWORK; INTERNET;
D O I
10.1016/j.future.2019.04.019
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks (WSNs) can be deployed in any unattended environment. With new enhancements in internet of things (IoT) technology, authorized users are able to access reliable sensor nodes. By accessing the sensor nodes, they can obtain data and send commands to the nodes. Designing an efficient secure authentication and key agreement scheme is vital because of the resource constrained nature of nodes. During the last decade, several lightweight two-factor or three-factor authentication and key agreement protocols have been proposed to provide secure communication links between users and sensor nodes. However, after careful assessment of these works, we found that two of recently proposed ones, which have tried to improve their previous works, are still susceptible to strong replay attacks or do not provide perfect forward secrecy. Therefore, to address this concern, in this paper, we propose a secure and lightweight authentication and key agreement protocol for IoT based WSNs that is free from the security challenges of previous protocols. Formal security verification of the proposed protocol is presented using the well-known and widely-accepted Automated Validation of Internet Security Protocols and Applications tool. Comparative security and performance evaluations with other related works indicate the superiority of the proposed protocol. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:882 / 892
页数:11
相关论文
共 57 条
  • [1] Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (11) : 4815 - 4828
  • [2] An Anonymous ECC-Based Self-Certified Key Distribution Scheme for the Smart Grid
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (10) : 7996 - 8004
  • [3] Security in Internet of Things: issues, challenges, taxonomy, and architecture
    Adat, Vipindev
    Gupta, B. B.
    [J]. TELECOMMUNICATION SYSTEMS, 2018, 67 (03) : 423 - 441
  • [4] Confidential smart-sensing framework in the IoT era
    Al-Turjman, Fadi
    Alturjman, Sinem
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (10) : 5187 - 5198
  • [5] Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks
    Al-Turjman, Fadi
    Ever, Yoney Kirsal
    Ever, Enver
    Nguyen, Huan X.
    David, Deebak Bakkiam
    [J]. IEEE ACCESS, 2017, 5 : 24617 - 24631
  • [6] Alabady S., 2018, International Journal of Parallel Programming
  • [7] Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Leng, Lu
    Kumar, Neeraj
    [J]. COMPUTER NETWORKS, 2016, 101 : 42 - 62
  • [8] A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    Amin, Ruhul
    Biswas, G. P.
    [J]. AD HOC NETWORKS, 2016, 36 : 58 - 80
  • [9] Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Li, Xiong
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [10] Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card
    Amin, Ruhul
    Biswas, G. P.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (11) : 3135 - 3149