An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs

被引:3
作者
Zhou, Boqing [1 ,2 ]
Li, Sujun [1 ]
Wang, Weiping [3 ]
Wang, Jianxin [3 ]
Cheng, Yun [4 ]
Wu, Jie [5 ]
机构
[1] Shaoguan Univ, Sch Informat Sci & Engn, Shaoguan 512005, Peoples R China
[2] Hunan Normal Univ, MOE LCSM, Sch Math & Stat, Changsha 410081, Hunan, Peoples R China
[3] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[4] Hunan Univ Humanities Sci & Technol, Dept Informat, Loudi 417000, Peoples R China
[5] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 06期
基金
中国国家自然科学基金;
关键词
3-D backward key chain based on deployment knowledge; authentication; mobile sink (MS) replication attack; unattended wireless sensor networks (UWSNs); KEY PRE-DISTRIBUTION; SENSOR; MANAGEMENT; SECURE;
D O I
10.1109/JIOT.2019.2930823
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS) replication attack. In this attack, using the compromised key information, an attacker can collect data from networks by impersonating sinks. To resist such an attack, some schemes have been proposed. To improve the resilience of MS replication attack of these schemes, we can integrate them with schemes based on deployment knowledge. However, there are the following defects: 1) the probability of mutual authentication between a MS and a sensor node is less than 1 and 2) during the authentication phase, the energy consumption of sensor nodes increases significantly as the deployment area expands. In this paper, we construct 3-D backward key chains based on deployment knowledge and propose a new authentication scheme based on these. As compared with these existing related schemes, the detailed theory analysis and simulation results indicate that the scheme can ensure that a MS can be authenticated by sensor nodes, and can improve the resilience of networks' MS replication attack with low energy consumption.
引用
收藏
页码:9738 / 9747
页数:10
相关论文
共 50 条
  • [21] More efficient key-hash based fingerprint remote authentication scheme using mobile device
    Muhammad Khurram Khan
    Saru Kumari
    Mridul K. Gupta
    Computing, 2014, 96 : 793 - 816
  • [22] More efficient key-hash based fingerprint remote authentication scheme using mobile device
    Khan, Muhammad Khurram
    Kumari, Saru
    Gupta, Mridul K.
    COMPUTING, 2014, 96 (09) : 793 - 816
  • [23] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
    Bander A. Alzahrani
    Azeem Irshad
    Arabian Journal for Science and Engineering, 2018, 43 : 8239 - 8253
  • [24] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.'s Scheme
    Alzahrani, Bander A.
    Irshad, Azeem
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 8239 - 8253
  • [25] An Efficient and Authentication Signcryption Scheme Based on Elliptic Curves
    Kumar, Manoj
    Gupta, Pratik
    MATEMATIKA, 2019, 35 (01) : 1 - 11
  • [26] EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack
    Xie, Yong
    Xu, Fang
    Li, Xiang
    Zhang, Songsong
    Zhang, Xiaodan
    Israr, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (03): : 903 - 924
  • [27] A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms
    Li, Ying
    Zhao, Guifen
    Du, Liping
    Guo, Jianwei
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 131 - 137
  • [28] A Blockchain based Authentication Scheme for Mobile Data Collector in IoT
    Jerbi, Wassim
    Cheikhrouhou, Omar
    Guermazi, Abderrahmen
    Hamam, Habib
    Trabelsi, Hafedh
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 929 - 934
  • [29] Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
    He, Debiao
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Wang, Lina
    Shen, Jian
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1621 - 1631
  • [30] An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing
    Xu, Yuan
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Wang, Zhaolong
    Xia, Zhe
    Zhang, Mingwu
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 1012 - 1023