Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN

被引:16
作者
Mehra, Pawan Singh [1 ]
Doja, Mohammad Najmud [2 ]
Alam, Bashir [2 ]
机构
[1] GL Bajaj Inst Technol & Management, Dept Comp Sci & Engn, Greater Noida 201306, India
[2] Jamia Millia Islamia, Fac Engn & Technol, Dept Comp Engn, New Delhi, India
关键词
energy efficiency; key management; mutual authentication; OTP; secure; WSN; 2-FACTOR USER AUTHENTICATION; WIRELESS SENSOR NETWORKS; MUTUAL AUTHENTICATION; AGREEMENT SCHEME; IMPROVEMENTS; EFFICIENT; INTERNET;
D O I
10.1002/dac.3879
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Network (WSN) is developing rapidly and used extensively in various critical applications like military, health, environment etc. Sometimes, the WSN is indiscriminately deployed in unattended hostile terrains such as border or remote region where besides energy efficiency, security is another important issue to be addressed. The adversary can have unauthorised access which can lead to tampering, modification, interception, eavesdropping etc. With the intention of improving the energy efficacy of WSN, clustering methods are developed, but dynamic behaviour of sensor nodes with limited storage and processing makes security a more challenging problem as resource intensive security solutions are not feasible in practical scenario. Key management is capable of addressing this problem by protecting the network from different attacks. In this paper, a highly secure Codeword Authenticated Key Exchange (CAKE) protocol is proposed which is based on one-way hashing with one time password and codeword authentication. BAN logic and Random Oracle Model are used for formal proof, and AVISPA tool is used for simulating the proposed work. CAKE is compared with other existing mutual authentication schemes which depicts significant reduction in computational time and energy consumption. The proposed protocol preserves Confidentiality, Integrity, and mutual authentication and can counter several attacks like offline guessing attack, replay attack, Dos attack, impersonation attack etc. and preserve perfect forward secrecy making the protocol suitable for various WSN applications.
引用
收藏
页数:27
相关论文
共 51 条
[1]   A robust mutual authentication protocol for WSN with multiple base-stations [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Obaidat, Mohammad S. .
AD HOC NETWORKS, 2018, 75-76 :1-18
[2]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[3]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[4]  
[Anonymous], 2016, SENSORS BASEL, DOI DOI 10.3390/S16122123
[5]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[6]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[7]   Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks [J].
Chang, I-Pin ;
Lee, Tian-Fu ;
Lin, Tsung-Hung ;
Liu, Chuan-Ming .
SENSORS, 2015, 15 (12) :29841-29854
[8]   A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques [J].
Chen, Lei ;
Wei, Fushan ;
Ma, Chuangui .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[9]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[10]  
Das AK, 2014, INT J TRUST MANAG CO, V2, P78, DOI DOI 10.1504/IJTMCC.2014.063273