An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

被引:73
作者
Das, Ashok Kumar [1 ]
Sutrala, Anil Kumar [1 ]
Kumari, Saru [2 ]
Odelu, Vanga [3 ]
Wazid, Mohammad [1 ]
Li, Xiong [4 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[3] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
关键词
hierarchical wireless sensor networks; authentication; key agreement; BAN logic; AVISPA; security; SMART-CARD; MUTUAL AUTHENTICATION; SECURE; PROTOCOL; CRYPTANALYSIS; IDENTITY;
D O I
10.1002/sec.1464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication in wireless sensor network (WSN) plays a very important role in which a legal registered user is allowed to access the real-time sensing information from the sensor nodes inside WSN. To allow such access, a user needs to be authenticated by the accessed sensor nodes as well as gateway nodes inside WSNs. Because of resource limitations and vulnerability to physical capture of some sensor nodes by an attacker, design of a secure user authentication in WSN continues to be an important and challenging research area in recent years. In this paper, we propose a new three-factor user authentication scheme based on the multi-gateway WSN architecture. Through the widely-accepted Burrows-Abadi-Needham logic, we prove that our scheme provides the secure mutual authentication. We then present the formal security verification of our proposed scheme using AVISPA tool, which is a powerful validation tool for network security applications, and show that our scheme is secure. In addition, the rigorous informal security analysis shows that our scheme is also secure against possible other known attacks including the sensor node capture attack. Furthermore, we present the additional functionality features that our scheme offers, which are efficient in communication and computation. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:2070 / 2092
页数:23
相关论文
共 65 条
  • [1] A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    Amin, Ruhul
    Biswas, G. P.
    [J]. AD HOC NETWORKS, 2016, 36 : 58 - 80
  • [2] [Anonymous], 2001, FIPS PUB
  • [3] [Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
  • [4] [Anonymous], IMPROVEMENT DASS 2 F
  • [5] [Anonymous], INTELLIGENCE, DOI DOI 10.3969/J.ISSN.1003-6059.2014.04.007
  • [6] [Anonymous], 2005, P APPSEM 2005 WORKSH
  • [7] [Anonymous], WIRELESS SENSOR NETW
  • [8] [Anonymous], IACR CRYPTOLOGY EPRI
  • [9] Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
  • [10] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13