An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs

被引:3
|
作者
Zhou, Boqing [1 ,2 ]
Li, Sujun [1 ]
Wang, Weiping [3 ]
Wang, Jianxin [3 ]
Cheng, Yun [4 ]
Wu, Jie [5 ]
机构
[1] Shaoguan Univ, Sch Informat Sci & Engn, Shaoguan 512005, Peoples R China
[2] Hunan Normal Univ, MOE LCSM, Sch Math & Stat, Changsha 410081, Hunan, Peoples R China
[3] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[4] Hunan Univ Humanities Sci & Technol, Dept Informat, Loudi 417000, Peoples R China
[5] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 06期
基金
中国国家自然科学基金;
关键词
3-D backward key chain based on deployment knowledge; authentication; mobile sink (MS) replication attack; unattended wireless sensor networks (UWSNs); KEY PRE-DISTRIBUTION; SENSOR; MANAGEMENT; SECURE;
D O I
10.1109/JIOT.2019.2930823
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS) replication attack. In this attack, using the compromised key information, an attacker can collect data from networks by impersonating sinks. To resist such an attack, some schemes have been proposed. To improve the resilience of MS replication attack of these schemes, we can integrate them with schemes based on deployment knowledge. However, there are the following defects: 1) the probability of mutual authentication between a MS and a sensor node is less than 1 and 2) during the authentication phase, the energy consumption of sensor nodes increases significantly as the deployment area expands. In this paper, we construct 3-D backward key chains based on deployment knowledge and propose a new authentication scheme based on these. As compared with these existing related schemes, the detailed theory analysis and simulation results indicate that the scheme can ensure that a MS can be authenticated by sensor nodes, and can improve the resilience of networks' MS replication attack with low energy consumption.
引用
收藏
页码:9738 / 9747
页数:10
相关论文
共 50 条
  • [1] A secure model against mobile sink replication attacks in unattended sensor networks
    Zhou, Boqing
    Li, Sujun
    Wang, Jianxin
    Cheng, Yun
    Wu, Jie
    COMPUTER NETWORKS, 2023, 221
  • [2] ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks
    Bhattacharya, Munmun
    Roy, Sandip
    Chattopadhyay, Samiran
    Das, Ashok Kumar
    Jamal, Sajjad Shaukat
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 234 - 245
  • [3] SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing
    Wang, Ziwang
    Wang, Liang
    Yan, Huili
    Wu, Zhize
    IEEE ACCESS, 2024, 12 : 175019 - 175031
  • [4] Scalable and efficient mobile authentication scheme preserving user privacy
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 12 (02) : 65 - 74
  • [5] Efficient authentication scheme for routing in mobile ad hoc networks
    Xu, SD
    Mu, Y
    Susilo, W
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 854 - 863
  • [6] A simple and efficient authentication scheme for mobile satellite communication systems
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chang, Rui-Xiang
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2012, 30 (01) : 29 - 38
  • [7] NERA: A new and efficient RSU based authentication scheme for VANETs
    Bayat, Majid
    Pournaghi, Morteza
    Rahimi, Majid
    Barmshoory, Mostafa
    WIRELESS NETWORKS, 2020, 26 (05) : 3083 - 3098
  • [8] A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof
    Su, Ziyi
    Wang, Shiwei
    Cai, Hongliu
    Huang, Jiaxuan
    Chen, Yourong
    Zhang, Xudong
    Alam, Muhammad
    ELECTRONICS, 2024, 13 (18)
  • [9] An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks
    Xu, Jie
    Xue, Kaiping
    Tian, Hangyu
    Hong, Jianan
    Wei, David S. L.
    Hong, Peilin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 6688 - 6698
  • [10] EAPA: An efficient authentication protocol against pollution attack for smart grid
    Mi Wen
    Jingsheng Lei
    Zhongqin Bi
    Jing Li
    Peer-to-Peer Networking and Applications, 2015, 8 : 1082 - 1089