An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs

被引:5
作者
Zhou, Boqing [1 ,2 ]
Li, Sujun [1 ]
Wang, Weiping [3 ]
Wang, Jianxin [3 ]
Cheng, Yun [4 ]
Wu, Jie [5 ]
机构
[1] Shaoguan Univ, Sch Informat Sci & Engn, Shaoguan 512005, Peoples R China
[2] Hunan Normal Univ, MOE LCSM, Sch Math & Stat, Changsha 410081, Hunan, Peoples R China
[3] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[4] Hunan Univ Humanities Sci & Technol, Dept Informat, Loudi 417000, Peoples R China
[5] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金;
关键词
3-D backward key chain based on deployment knowledge; authentication; mobile sink (MS) replication attack; unattended wireless sensor networks (UWSNs); KEY PRE-DISTRIBUTION; SENSOR; MANAGEMENT; SECURE;
D O I
10.1109/JIOT.2019.2930823
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS) replication attack. In this attack, using the compromised key information, an attacker can collect data from networks by impersonating sinks. To resist such an attack, some schemes have been proposed. To improve the resilience of MS replication attack of these schemes, we can integrate them with schemes based on deployment knowledge. However, there are the following defects: 1) the probability of mutual authentication between a MS and a sensor node is less than 1 and 2) during the authentication phase, the energy consumption of sensor nodes increases significantly as the deployment area expands. In this paper, we construct 3-D backward key chains based on deployment knowledge and propose a new authentication scheme based on these. As compared with these existing related schemes, the detailed theory analysis and simulation results indicate that the scheme can ensure that a MS can be authenticated by sensor nodes, and can improve the resilience of networks' MS replication attack with low energy consumption.
引用
收藏
页码:9738 / 9747
页数:10
相关论文
共 50 条
[21]   Stolen-verifier attack on an efficient smartcard-based one-time password authentication scheme [J].
Ku, WC ;
Tsai, HC ;
Tsaur, MJ .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (08) :2374-2376
[22]   More efficient key-hash based fingerprint remote authentication scheme using mobile device [J].
Muhammad Khurram Khan ;
Saru Kumari ;
Mridul K. Gupta .
Computing, 2014, 96 :793-816
[23]   More efficient key-hash based fingerprint remote authentication scheme using mobile device [J].
Khan, Muhammad Khurram ;
Kumari, Saru ;
Gupta, Mridul K. .
COMPUTING, 2014, 96 (09) :793-816
[24]   A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme [J].
Bander A. Alzahrani ;
Azeem Irshad .
Arabian Journal for Science and Engineering, 2018, 43 :8239-8253
[25]   A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.'s Scheme [J].
Alzahrani, Bander A. ;
Irshad, Azeem .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) :8239-8253
[26]   An Efficient and Authentication Signcryption Scheme Based on Elliptic Curves [J].
Kumar, Manoj ;
Gupta, Pratik .
MATEMATIKA, 2019, 35 (01) :1-11
[27]   EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack [J].
Xie, Yong ;
Xu, Fang ;
Li, Xiang ;
Zhang, Songsong ;
Zhang, Xiaodan ;
Israr, Muhammad .
CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (03) :903-924
[28]   A Blockchain based Authentication Scheme for Mobile Data Collector in IoT [J].
Jerbi, Wassim ;
Cheikhrouhou, Omar ;
Guermazi, Abderrahmen ;
Hamam, Habib ;
Trabelsi, Hafedh .
IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, :929-934
[29]   A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms [J].
Li, Ying ;
Zhao, Guifen ;
Du, Liping ;
Guo, Jianwei .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 :131-137
[30]   Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services [J].
He, Debiao ;
Kumar, Neeraj ;
Khan, Muhammad Khurram ;
Wang, Lina ;
Shen, Jian .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :1621-1631